last executing test programs: 14m55.490786405s ago: executing program 32 (id=347): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x3, 0xac5) syz_clone3(&(0x7f0000000900)={0x23800000, &(0x7f0000000040)=0xffffffffffffffff, 0x0, 0x0, {0x27}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r4, &(0x7f0000000280), 0x10) setsockopt$CAN_RAW_ERR_FILTER(r4, 0x65, 0x2, &(0x7f0000000080)=0x8, 0x4) setsockopt$CAN_RAW_FILTER(r4, 0x65, 0x1, &(0x7f0000000400)=[{{0x2, 0x1, 0x1, 0x1}, {0x3, 0x1, 0x1, 0x1}}, {{0x4, 0x1, 0x1}, {0x2, 0x0, 0x1, 0x1}}, {{0x4, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x1, 0x1}, {0x2, 0x1, 0x1, 0x1}}, {{0x2, 0x0, 0x0, 0x1}, {0x3}}, {{0x2, 0x1, 0x1}, {0x2}}], 0x30) close(r4) io_setup(0x8, &(0x7f0000000600)=0x0) io_submit(r5, 0x1, &(0x7f0000001300)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x6, r3, 0x0}]) syz_emit_ethernet(0x66, &(0x7f0000000080)=ANY=[], 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r7) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYBLOB="01000000010000001c0012000c00010062"], 0x3c}}, 0x0) 9m26.815641937s ago: executing program 4 (id=1927): fcntl$setsig(0xffffffffffffffff, 0xa, 0x31) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xb, 0x88}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000003800000238000000040000000200000000110400000002000000000000000000000400000000020000000000001202000000020000000000000e03000000"], 0x0, 0x54}, 0x28) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000300)=0x7) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b4000000000000006311210000000000851000000200000085000000b500000095000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) setxattr$security_ima(0x0, &(0x7f0000000080), &(0x7f0000000100)=@sha1={0x1, "135e05ce8ce63c18f826a69c16e06c678ba7da37"}, 0x15, 0x1) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="020300090a0000000000000004000000030006000000000002000000ac1414000000000000000000020001000000000000000002fffffffb030005000000000002"], 0x50}}, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000180)={{{@in=@private, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x2, 0x0, 0x0, 0x200000000000000}, {0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x6c}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x4}}, 0xe8) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x800400, &(0x7f0000000100), 0x1, 0x500, &(0x7f0000000500)="$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") rt_sigqueueinfo(0x0, 0x3b, &(0x7f0000000580)={0x37, 0x5, 0x9}) socket$key(0xf, 0x3, 0x2) prctl$PR_SET_IO_FLUSHER(0x34, 0x2) r6 = syz_open_procfs(0x0, &(0x7f00000193c0)='net/igmp6\x00') setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f0000000140)=0x1, 0x4) 9m25.82655901s ago: executing program 4 (id=1932): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000001}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0xc0}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b7000000000000"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee68886dd", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 9m25.538876847s ago: executing program 4 (id=1937): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a80)=@newtaction={0x168, 0x30, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [{0xa0, 0x1, [@m_simple={0x9c, 0x18, 0x0, 0x0, {{0xb}, {0x10, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x9, 0x3, '\t\x00\x00\x00\x00'}]}, {0x61, 0x6, "c92acebef543cf5eac95ff99fdfe71226f0f8ca3945cf1e27303fef4d7edee9dc07b9c204234f1518f815a1e6f9900be0653c30ee7044fc49940d26166aca9768a60e2633236607ed8e41497a644f35e0d2494ec2432e189bde8a31ee3"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}]}, {0xb4, 0x1, [@m_simple={0x5c, 0x2, 0x0, 0x0, {{0xb}, {0x4}, {0x30, 0x6, "3ac47d8f66b9ada606aa60a7fc99c95c9fbb58402dd443e92602f7994c557e40094500a136bb53cc323abe8e"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ct={0x54, 0x17, 0x0, 0x0, {{0x7}, {0x2c, 0x2, 0x0, 0x1, [@TCA_CT_NAT_IPV6_MAX={0x14, 0xc, @remote}, @TCA_CT_LABELS={0x14, 0x7, "1fc075f6ec8940afab5885e58057ae3f"}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x4000880}, 0x20000080) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={0xffffffffffffffff, 0x0, 0xf, 0x0, &(0x7f0000000140)="e0b954bc676224cad905cbe99a8f50", 0x0, 0x20041ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8004}, 0x40000) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x21}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0xffffffffffffff2f, 0xa1}}], 0x4000000000003b4, 0x2040000, &(0x7f0000003700)={0x77359400}) 9m25.488841852s ago: executing program 4 (id=1939): mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x49) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x262) 9m25.433010957s ago: executing program 4 (id=1940): mknodat$loop(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x149800, 0x0) r0 = syz_io_uring_setup(0x7dc9, &(0x7f0000000340)={0x0, 0x849b, 0x10100, 0xfffffff8, 0x234}, &(0x7f0000000140), &(0x7f0000000000)=0x0) syz_io_uring_setup(0x1868, &(0x7f00000007c0)={0x0, 0xf503, 0x40, 0x0, 0x10}, &(0x7f0000000700)=0x0, &(0x7f0000000640)) syz_io_uring_submit(r2, r1, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) io_uring_enter(r0, 0x184c, 0x0, 0x0, 0x0, 0x0) 9m25.306979999s ago: executing program 4 (id=1941): r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0105500, 0x0) 9m25.290732051s ago: executing program 33 (id=1941): r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0105500, 0x0) 5m46.740385579s ago: executing program 2 (id=4690): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r0) sendmsg$IEEE802154_START_REQ(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000280)={0x3c, r1, 0x101, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_CHANNEL={0x5, 0x7, 0x17}, @IEEE802154_ATTR_COORD_PAN_ID={0x6, 0xa, 0x2}, @IEEE802154_ATTR_BCN_ORD={0x5, 0x17, 0x9}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa0}, @IEEE802154_ATTR_SF_ORD={0x5, 0x18, 0xb}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x8080) 5m46.61742224s ago: executing program 2 (id=4693): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000d40)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000005f"], 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x10, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x1}, 0x2002, 0x32, 0x43a1bd56, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f0000000580)={0xbc, 0xa, 0x6, 0x301, 0x0, 0x0, {0x3, 0x0, 0x1}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_ADT={0x2c, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz1\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x7}}]}, @IPSET_ATTR_ADT={0x54, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x7fff}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x9}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x4}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x7}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8}}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0xbc}, 0x1, 0x0, 0x0, 0x11}, 0x40001) io_uring_register$IORING_REGISTER_IOWQ_AFF(0xffffffffffffffff, 0x25, &(0x7f0000000d40)="01", 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xf5b67000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$TUNSETOFFLOAD(r6, 0x400454d0, 0x1e) perf_event_open(&(0x7f0000002d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00000e1000/0x800000)=nil, 0x800000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x40000000) r8 = syz_pidfd_open(r7, 0x0) wait4(r7, 0x0, 0x8, 0x0) ioctl$FS_IOC_GETVERSION(r8, 0xc040ff0b, &(0x7f0000000180)) connect$unix(r4, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='bic', 0x3) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000001c0)=0xa3, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffef, 0x0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) 5m44.989868174s ago: executing program 2 (id=4708): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x47f2, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040), 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r3, 0x0, r2, 0x0, 0x1, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000600)='4', 0x1}], 0x1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) write$binfmt_script(r4, &(0x7f00000000c0), 0xb) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000300)='./file0\x00', 0x800, &(0x7f0000000040)=ANY=[], 0x5, 0x7f3, &(0x7f0000000340)="$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") open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[@ANYBLOB=' '], 0x0) 5m44.298488596s ago: executing program 2 (id=4712): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xa8, 0x2, 0x0, 0x0, 0x0, 0x1, 0x400, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x5}, 0x1a2d, 0x0, 0x7fa, 0x8, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid_for_children\x00') mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) (async) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') fchdir(r0) (async, rerun: 64) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=""/156, 0x9c) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x10, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000800911131000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) 5m44.051333518s ago: executing program 2 (id=4715): r0 = socket$netlink(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000c40), r1) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x14, r2, 0x1, 0x0, 0x0, {0x6, 0x0, 0x900}}, 0x14}, 0x2, 0x34005}, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)=0x10) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) ioctl$SIOCPNDELRESOURCE(r4, 0x89ef, &(0x7f0000000100)=0x10) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000840)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x0, 0x0, 0x4e22, 0x0, 0x2, 0x20, 0x0, 0x5c}, {0x0, 0x100000000, 0x0, 0x7fffffff, 0x0, 0x2}, {0xfffffffffffffffe, 0xffffffffffffffff}, 0x0, 0x9, 0x1, 0x0, 0x0, 0x3}}, 0xb8}}, 0x0) 5m44.032728039s ago: executing program 2 (id=4716): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000001}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0xc0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) 5m27.757067957s ago: executing program 34 (id=4716): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x40000004, 0xa021, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0, 0xc}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000001}, 0x0, 0x0, 0xc2ba}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0xc0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) 4m17.415691241s ago: executing program 7 (id=5569): r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newsa={0x160, 0x10, 0x713, 0x70bd26, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@dev={0xac, 0x14, 0x14, 0x13}, 0x4e22, 0x1, 0x0, 0x3, 0x2, 0x0, 0x0, 0x3a, 0x0, 0xffffffffffffffff}, {@in6=@remote, 0x0, 0x32}, @in6=@local, {0x0, 0x0, 0x8, 0xa, 0x6, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x2, 0xfffffffffffffff8}, {0xc, 0x0, 0x2}, 0x70bd29, 0x0, 0x2, 0x1, 0x0, 0x28}, [@algo_aead={0x68, 0x12, {{'rfc4543(gcm(aes))\x00'}, 0xe0, 0x80, "316f74eeac053deb73fc018493cc121927a9bca207141b9a451c00aa"}}, @tfcpad={0x8, 0x16, 0x4}]}, 0x160}, 0x1, 0x0, 0x0, 0xc0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x4570) 4m17.222792759s ago: executing program 7 (id=5571): r0 = socket$inet_sctp(0x2, 0x1, 0x84) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61158c000000000061134c0000000000bfa00000000000001705000008004ef02d3501000000000095000000000000006916180000000000bf67000000000000350605000fff07206706000004000000160302000ee60060bf500000000000000f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9d0cc7d3b4814261bdb94a050000a28a404be266df76965947c73c00c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b540dcfc7ad0500c4063b3b8754c0686cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44e2a2235c8ac86d8a297dff0445a15f21dce431e567238809000000000000000ae2fb494059bba8e3b680324a188090eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb40000000000000000000000000040007abf9c20d89cbc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000007b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eb29000000000000003cc3aa39ee4b1386bab561cda886fa64ffffff7f473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d632bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59801fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db88aa3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d00000000d3114dbc7e2bf2402a75fd7a5573336004088000000000000000fb38c7f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604faf0a4da65396174b4563d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2b517dc4a29b9cba8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf73400000000000000cc308e936d7637e07c4a2a3bc87b0da23c00d9ef418cf19e7a8c4c328be0ce91798adc2dca8710d5c617df01f82a73f6bd61d1f5b2a443faa9bda0577383dc18402cde8bf777b2eaa45c940aabc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db009acaba9eaea90000d154ba10a8e51489a614e69722bac30000000000000000000000000000c5dfd188ff555285b9743d3aac000583f42d168613151d681a2f71373f20d92c9048407c91fabecfe8a10300004d127edab14ba61ba1cfc4336324c86f3dcb43e9a58208077e90f6ec1c7ac756f61dcc372cdd30b82507489f0bbfbd3c3f21752e81319c0161e154ceb16e00bc7f5a6962dff317f4d014786e432817064874d69a39cb0da31bcc5f81894d8a80756447322207b4007dff12eb95066cc6bc256f0a12282224bb031bbee6d23cef7074f6d718b06ca80b57aa183dd0c39e9d8547c666b6764a3c7dd62a94eee45881441f2b89b4c67aa9882281393954972046974f18df232cd7fca610e33f51c2d062020f403d85ff36c26e2f6bd1d82f4d3ceb3472d9a77e0057a3bfe697d9ab7585f4a1b381343d2cf855689232f4fc5135790662dc1419a365b5b11df7216652b5703f31e078ecdefe8e6bfc45a9980a7a8de863e3477dd47d0f11611ca92d89641a183c8f629f17cfc28fde209a793d9c0cdde3bb3f82670d33396982988b9f5207a732908fdf1506f307ccae47a69319ee2242272e4f7ceb7a40e49a21ce6405af3ecb3381bf0668749c81fc6c2d97e68a693e3e622af52e572f4fa7b20d5c72cf5ff8016461130a46803de45029489921a48bd7688dd593e4a3e9803263ecbd8ae8570293508ebe5fabc1842cbc01ae8fabbf41820c31b7bb83a3439d4540f839ed5c23828a33d7645baa1ec32bb7aa8a786bb0997ccf6bba0a2cf6ef2157a63974d5e525a3f3f7f993ea9e82732ccc2e12c631012175d5d474bef818bdf8f27a7e563684a225dee6ca5f5ff18a89ac6c627ff0e0e4769b6fbcfc847b20960704a4b13e962333bddb966de8bcade6f6bd3915a580ddec2e1bd88fbfdb749789cdc946822212f1cbacb03ba8d3e51e48ccdae20a43bf79ca0131b830620a97877242989e78dfec1d6df5f97ca5cddece50d0cae5d6eabbc1913aa3660e0b00000000000000000000000000bc16b71cb118d93461aa2914d6e454ef05c41beab7382787ba46b68c8d8b35da9fb58b259b4447b59c667ddcac0bb2d066eb0579be84bdca8ed5d693411b7e5b21efaceddacef03daa9772f2715b5613ae0d88f8d109e36f8b8871b646d9ebbcc25d527ad3f828c92cb6597f82ed4d496a511007781be0c7cac07fc508a585f415ef81a887475286df80fb6ff9c6524d0e22d50f88ca15545bc688063b04eb8e0248aca60b9983dd5966216499ccfc0551f6e0323859ae64f55e4d496a695f8e6382aa714b92f95dcfd0b456d9ce7a24f736e4009ef64230e8f83f8283a4cc5f178d4698b94ccd8d0e0e3e2e35e1a7ac0cb3ee52013e8c2802d2f89b3f708fb53c17c3e4fbe0326ee510c4317b5f5f1eb34ca8441c23755acfc469909b16fba134de01d484c1b380622d37"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x37de6c8a68769c38}, 0x48) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e23, @loopback}], 0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x4e23, @loopback}], 0x10) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000280)={0x0, 0x819}, &(0x7f0000000380)=0x8) 4m16.917911516s ago: executing program 7 (id=5573): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) fdatasync(r0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000080)={{0x1, 0x6}, 'port1\x00', 0xc, 0x1000, 0x0, 0x0, 0x9d35, 0x4, 0x7, 0x0, 0x2, 0x5}) r1 = socket(0x2, 0x80805, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000070000000900010073797a30000000004c000000090a010400000000000000000700000608000a40000000000900020073797a3100000000090001007379683000000000080005400000000d08000400ffffff"], 0xa8}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = dup(r4) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYRES16=r5, @ANYRESHEX=r5], 0x20}, 0x1, 0x0, 0x0, 0x20000001}, 0x8014) shutdown(r3, 0x0) close(0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e23, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x7a, &(0x7f0000000340)={r6, @in6={{0xa, 0x3, 0x4, @mcast1}}}, &(0x7f0000000040)=0x84) sendmmsg$inet_sctp(r1, &(0x7f0000000900)=[{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000400)='b', 0x1}], 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="0100000000000000840000000200000006000400080000000bf60b3a", @ANYRES32=r7], 0x20, 0x24048844}], 0x1, 0x0) ioctl$KDSKBLED(r5, 0x4b65, 0x100000001) mq_timedreceive(r5, &(0x7f0000001940)=""/4096, 0x1000, 0x40400000f, &(0x7f0000000000)={0x0, 0x989680}) 4m16.818829545s ago: executing program 7 (id=5574): r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x4a38, 0x201) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000000)={0x53, 0xfffffffffffffffd, 0x5, 0xb4, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000200)="2b04002000", 0x0, 0x2, 0x10023, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30}) 4m16.805933695s ago: executing program 7 (id=5575): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x20) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x5, 0x0, 0x5}) 4m16.694865575s ago: executing program 7 (id=5577): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x6, @loopback, 0x3}], 0x1c) sendmsg$inet6(r0, &(0x7f0000000500)={&(0x7f0000000080)={0xa, 0x4e24, 0xb, @loopback, 0x4}, 0x1c, &(0x7f0000000380)=[{&(0x7f00000000c0)="88", 0x1}], 0x1}, 0x48043) r2 = dup(r0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='ip6gretap0\x00', 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e22, @empty}}, 0x8003, 0xbffc, 0xe654, 0x2, 0x4, 0x48, 0xff}, 0x9c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0xce20, 0x6, @empty, 0x2d}}, 0x7, 0x1, 0xf06, 0x3, 0xb4, 0x7f, 0x9}, 0x9c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e60, 0xeffffff2, @empty, 0x5}}, 0x10001fc, 0x6, 0xffff1896, 0x3, 0x26, 0xffffffb9, 0x1a}, 0x9c) (fail_nth: 2) 4m0.463608049s ago: executing program 35 (id=5577): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x6, @loopback, 0x3}], 0x1c) sendmsg$inet6(r0, &(0x7f0000000500)={&(0x7f0000000080)={0xa, 0x4e24, 0xb, @loopback, 0x4}, 0x1c, &(0x7f0000000380)=[{&(0x7f00000000c0)="88", 0x1}], 0x1}, 0x48043) r2 = dup(r0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='ip6gretap0\x00', 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e22, @empty}}, 0x8003, 0xbffc, 0xe654, 0x2, 0x4, 0x48, 0xff}, 0x9c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0xce20, 0x6, @empty, 0x2d}}, 0x7, 0x1, 0xf06, 0x3, 0xb4, 0x7f, 0x9}, 0x9c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e60, 0xeffffff2, @empty, 0x5}}, 0x10001fc, 0x6, 0xffff1896, 0x3, 0x26, 0xffffffb9, 0x1a}, 0x9c) (fail_nth: 2) 3m30.554732418s ago: executing program 6 (id=6134): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001800)={0x6, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000003000000000400000095000000000000004d6b4855a9617a11936e120ddd34317d9a3bbdaef98337c59f9b4ef5c8559a21cbd95b7fb954e51ec10279a251f34b149d428e0c03dbbeabff6c03854368e1072332a6200ada624bf6476feaf6fa651375bfed05de47365fb6872ae0de638fbe2b22d58debaea2061890625a1fc23c5f9edb1cb6b77403055ea74354e1c3a0d2cc51ab3ad9978ec15c5e5f"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1}, 0x94) tee(r0, r0, 0x800, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x4, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x8, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3af, 0x4}, 0x100000, 0x0, 0x0, 0x7, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f00005b4000/0x4000)=nil, 0x100000000004000, 0x0, 0x0, 0x0, 0x2) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x7, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x20, 0x10, &(0x7f0000000000)={0x0, 0x5}, 0xfffffffffffffd00}, 0x48) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="340000001000010800000000fddbdf7700000000", @ANYBLOB="d14d13308f475d3e19990a919191e2ed953595b90db4a231e9f840e137811883122833213b1c43635c2964bcbc5e14f4b27cc1e35ba4b04f875a03bcc00c", @ANYBLOB="00000000000000000c002b8008000100", @ANYBLOB="08001b"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000500)={0x1001, 0x3ffffffc}, 0x8) close(r2) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$llc_int(r3, 0x10c, 0x5, &(0x7f0000001b00), &(0x7f0000000480)=0x4) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x2, 0x0, 0x7fffffff}]}) fcntl$lock(r4, 0x0, &(0x7f0000000ac0)={0x1, 0x2, 0x6, 0x300000000000000}) 3m30.286617352s ago: executing program 6 (id=6135): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f00000001c0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x4}}, {@debug}, {@journal_dev={'journal_dev', 0x3d, 0x7}}]}, 0x1, 0x5fd, &(0x7f00000006c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1002, 0x98) write(r1, 0x0, 0x0) sendfile(r1, r0, 0x0, 0x3ffff) 3m30.263244944s ago: executing program 6 (id=6136): syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") prctl$PR_SET_MM(0x23, 0x1, &(0x7f00002b0000/0x2000)=nil) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x44, 0x0, 0x8, 0x101, 0x0, 0x0, {0xa, 0x0, 0x2}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x11}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0x1ff}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x9}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x8040) 3m30.243235066s ago: executing program 6 (id=6137): sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="4c00000002060108e80034e40000000000000000050001000600000005000400000000000900020073797a3100000000050005000a00000012000300686173683a6e65742c706f7274"], 0x4c}}, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000740)={0x5c, 0x9, 0x6, 0x801, 0x0, 0x0, {0x7}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x34, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @private0}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0xe1f}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x88}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e1f}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10000042}, 0x90) 3m30.185445721s ago: executing program 6 (id=6138): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x20) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000000)={0x5, 0x0, 0x5}) 3m30.168687572s ago: executing program 6 (id=6139): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001440)=[{{0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000700)="c87b35043e70167a3e59c95cf2d2470a409aed8df615eda880680920e7ea2e4413084cba0ac21d664201fbe69bf2660ea3918ef0b6727862bbd91dfce9385577a868d3a94cbfd3756c4fc07934e5ae442a225605985c4a8e3de576c99ecd23d425b1f09e6413e8f779e0723e88fc0d8cc981391df5e1f5ba5fa3ca690b47", 0x7e}, {&(0x7f0000000300)="c071c346d7762184984cd6fc3bd9904a7df7f6f0cc0d7bf8e1359a106b1f25eb975e8b38ca101a0706ae683586cbdb", 0x2f}, {&(0x7f00000007c0)="e4e86ea4ab941009402773769eb1b04ad141f53294bf37a503b368ec7378ebb37de43aa11a211b4486253928fb4e4f8874d02cb4d8e961a9b6815ff9a2dec718f23e2b294767db301a17e9d6cd95d7f94a732e6a3c38750a53e71307f9fc58e26b1b9147df16e7b12720ed83999e722ea43c3f1b5b682f44ec468d762b1af6290f4bcd7fcc34e7facbf69dabcc4e95a7ac43f137e3a7d8bae77ad30928ac7aab8f3954ad4cb5430c93a4fd70f8ef79bbc8d44e9eda26d94c90354e8daf238e527c43aea27d", 0xc5}, {&(0x7f00000008c0)="96d2502e8c4241346fdc3fe5cee92278ad930f37caffe5853aaf307a54dbc2401f258383278cd81465da6006bf0e9fca4a645e7a170338ffda0e71555ad50ee0851a7e23c343e80a80696e0506ca8601cd8c75b2853fd821a0d92d4d6d39783a5a2b52c29ed15fe0c70a698e9a9d449df75692dd401991ce8398d5b1200f96486b0e945f82e8f195351587b2069eebd4108e37157a8cb58c6897ba7347210a76a3b5ce899dfda49af93121f48d80b3bc95ae357a373e024f", 0xb8}, {&(0x7f00000009c0)="8fc0b2a81484cc772382f160be90c69e671bd63af074a263c6b4ad7db8683d47a7c6ef6afcab4f657c041926c2d44a244baed8cd0f37d434bb44167b50e348d991ba6a7ccb45b3c145d06835e8ba9e499823a6aa5bc71a4a3c2cb14d0560a9cdf65a95c0a98a77ab116ba74c27a023bd062d409f9aeecec3c46e9f005831b28971a8992f77ca115e77ef100eff5b3b13fb3024aa4464294448d52434f738e2cbffecf500ec25d50eae115d988ba94e17995e61578105f705ed17a2a468c20f650bd3c738fcd8dfe006a44e6f", 0xcc}, {&(0x7f0000000fc0)="c2f47f717d0251df716d989724eebf6149d572a0787fc434c74fcef1c6ca35e8e0334afd04f2d333095271b72e96ad5ce488bd0a8b7f9f5dbe0398", 0x3b}], 0x6}}], 0x1, 0x24044000) sendmmsg$inet(r0, &(0x7f0000000b00)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000140)="91f8a9849519def28691bbc4173c3d6f357d0272b7319130feaab952ac4703cad04be68907e50e997fc26e4c91ea4feb931647fc5393de25000000000000", 0x3e}, {&(0x7f0000000e80)="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", 0x11c}, {&(0x7f0000000640)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7df", 0x2a}], 0x3}}, {{0x0, 0x0, &(0x7f00000002c0)=[{0x0}, {&(0x7f0000000d00)="31cef842d9c50636f60fc0cfdac56c75f1687f0c56287423f5eed69f117e766bdbad0c2171ad6227e1173ab6efa2fcb1c420a51a0917861009000000f049c606ccab7cda1f0e3490fbe385ea382294882839a22674037b8910bd8a1420e33eb1be6f10cfb24eb7cccdf1528ef33b34ab07cdb0909a9ba9547e1e343b451d9025c4e153612d4674b9411fb4de295599abbcb388d291aa839ab0954e6a8dfc19c3c1533a11d81e03a4879bd736f1caacc2bbf1194598a652677efb930a5b6ee292c57402e0cc07a9a26ee794e46e604a9aec550d12af09f782e1f6a996f075660484", 0xe1}], 0x2}}], 0x2, 0x2090) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 3m14.094010042s ago: executing program 36 (id=6139): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001440)=[{{0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000700)="c87b35043e70167a3e59c95cf2d2470a409aed8df615eda880680920e7ea2e4413084cba0ac21d664201fbe69bf2660ea3918ef0b6727862bbd91dfce9385577a868d3a94cbfd3756c4fc07934e5ae442a225605985c4a8e3de576c99ecd23d425b1f09e6413e8f779e0723e88fc0d8cc981391df5e1f5ba5fa3ca690b47", 0x7e}, {&(0x7f0000000300)="c071c346d7762184984cd6fc3bd9904a7df7f6f0cc0d7bf8e1359a106b1f25eb975e8b38ca101a0706ae683586cbdb", 0x2f}, {&(0x7f00000007c0)="e4e86ea4ab941009402773769eb1b04ad141f53294bf37a503b368ec7378ebb37de43aa11a211b4486253928fb4e4f8874d02cb4d8e961a9b6815ff9a2dec718f23e2b294767db301a17e9d6cd95d7f94a732e6a3c38750a53e71307f9fc58e26b1b9147df16e7b12720ed83999e722ea43c3f1b5b682f44ec468d762b1af6290f4bcd7fcc34e7facbf69dabcc4e95a7ac43f137e3a7d8bae77ad30928ac7aab8f3954ad4cb5430c93a4fd70f8ef79bbc8d44e9eda26d94c90354e8daf238e527c43aea27d", 0xc5}, {&(0x7f00000008c0)="96d2502e8c4241346fdc3fe5cee92278ad930f37caffe5853aaf307a54dbc2401f258383278cd81465da6006bf0e9fca4a645e7a170338ffda0e71555ad50ee0851a7e23c343e80a80696e0506ca8601cd8c75b2853fd821a0d92d4d6d39783a5a2b52c29ed15fe0c70a698e9a9d449df75692dd401991ce8398d5b1200f96486b0e945f82e8f195351587b2069eebd4108e37157a8cb58c6897ba7347210a76a3b5ce899dfda49af93121f48d80b3bc95ae357a373e024f", 0xb8}, {&(0x7f00000009c0)="8fc0b2a81484cc772382f160be90c69e671bd63af074a263c6b4ad7db8683d47a7c6ef6afcab4f657c041926c2d44a244baed8cd0f37d434bb44167b50e348d991ba6a7ccb45b3c145d06835e8ba9e499823a6aa5bc71a4a3c2cb14d0560a9cdf65a95c0a98a77ab116ba74c27a023bd062d409f9aeecec3c46e9f005831b28971a8992f77ca115e77ef100eff5b3b13fb3024aa4464294448d52434f738e2cbffecf500ec25d50eae115d988ba94e17995e61578105f705ed17a2a468c20f650bd3c738fcd8dfe006a44e6f", 0xcc}, {&(0x7f0000000fc0)="c2f47f717d0251df716d989724eebf6149d572a0787fc434c74fcef1c6ca35e8e0334afd04f2d333095271b72e96ad5ce488bd0a8b7f9f5dbe0398", 0x3b}], 0x6}}], 0x1, 0x24044000) sendmmsg$inet(r0, &(0x7f0000000b00)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000140)="91f8a9849519def28691bbc4173c3d6f357d0272b7319130feaab952ac4703cad04be68907e50e997fc26e4c91ea4feb931647fc5393de25000000000000", 0x3e}, {&(0x7f0000000e80)="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", 0x11c}, {&(0x7f0000000640)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7df", 0x2a}], 0x3}}, {{0x0, 0x0, &(0x7f00000002c0)=[{0x0}, {&(0x7f0000000d00)="31cef842d9c50636f60fc0cfdac56c75f1687f0c56287423f5eed69f117e766bdbad0c2171ad6227e1173ab6efa2fcb1c420a51a0917861009000000f049c606ccab7cda1f0e3490fbe385ea382294882839a22674037b8910bd8a1420e33eb1be6f10cfb24eb7cccdf1528ef33b34ab07cdb0909a9ba9547e1e343b451d9025c4e153612d4674b9411fb4de295599abbcb388d291aa839ab0954e6a8dfc19c3c1533a11d81e03a4879bd736f1caacc2bbf1194598a652677efb930a5b6ee292c57402e0cc07a9a26ee794e46e604a9aec550d12af09f782e1f6a996f075660484", 0xe1}], 0x2}}], 0x2, 0x2090) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 1m25.35895076s ago: executing program 0 (id=7704): capset(&(0x7f0000000040)={0x20071026}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x3a) sendmmsg$inet6(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)={0xa, 0x0, 0x0, @empty, 0x80000006}, 0x1c, &(0x7f0000000340)=[{&(0x7f00000002c0)="8000102e75d72414", 0x8}], 0x1, &(0x7f000001fcc0)=ANY=[@ANYBLOB='@\x00\x00\x00\x00\x00\x00\x00)\x00\x00\x007'], 0x80}}], 0x1, 0x40000000) 1m25.35868985s ago: executing program 0 (id=7705): r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmmsg$sock(r0, &(0x7f0000000cc0)=[{{&(0x7f0000000100)=@l2tp={0x2, 0x0, @broadcast, 0x3}, 0x80, 0x0}}], 0x1, 0x48094) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='blkio.bfq.io_queued\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) syz_open_procfs(0x0, &(0x7f0000000000)='cmdline\x00') r2 = semget$private(0x0, 0x6, 0x431) semtimedop(r2, &(0x7f00000003c0)=[{0x2, 0x4, 0x1800}], 0x1, 0x0) semop(r2, &(0x7f00000000c0)=[{0x4}, {0x2}], 0x2) r3 = socket$inet(0x2, 0x0, 0xf) recvfrom(r3, &(0x7f000000be80)=""/101, 0x65, 0x40000106, &(0x7f000000bf00)=@vsock={0x28, 0x0, 0xffffffff, @host}, 0x80) semop(r2, &(0x7f0000000200)=[{0x0, 0xffff, 0x1000}], 0x1) semctl$SETALL(r2, 0x0, 0x11, &(0x7f0000000000)=[0x1]) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], &(0x7f0000003680)=""/4110, 0x26, 0x100e, 0x1}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r4, 0x20, &(0x7f0000000680)={&(0x7f0000002680)=""/4096, 0x1000, 0x0, 0x0}}, 0x10) socket$inet6_mptcp(0xa, 0x1, 0x106) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000b00)={0xb8, 0x0, 0x2, 0x201, 0x0, 0x0, {0x7, 0x0, 0x2}, [@CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x34e6}, @CTA_EXPECT_NAT={0x8c, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x50, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_EXPECT_NAT_TUPLE={0x28, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'ftp-20000\x00'}]}, 0xb8}, 0x1, 0x0, 0x0, 0x40010}, 0x4008000) socket(0x10, 0x803, 0x0) socket$inet(0x10, 0x3, 0x0) semctl$GETPID(r2, 0x4, 0xb, &(0x7f0000000880)=""/193) 1m24.388178716s ago: executing program 0 (id=7716): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@ipv4_newrule={0x1c, 0x20, 0x301, 0x0, 0x25dfdbfe, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5}}, 0x1c}}, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(0x0, 0x0, 0x3ff) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x80, &(0x7f0000000b80)=ANY=[@ANYBLOB="636865636b3d7374726963742c757466383d312c757466383d302c757466383d312c6e66732c6572726f72733d72656d6f756e742d726f2c73686f72746e616d653d77696e6e742c00043518f9aad8a4f2c1cdb3e993cf0444d9d2d40bb509d4da042c2c85e3650de97db42c38cafa7a9d7503c3c985486cf7fc80515e9bef7e9e56fb346de370b3eb3ecbc59d343c36bf04efc3d68033308b0014b0c677ae5ef2932cc05f566112668fa4f6844dcf823618a2993da771384e8fc12467a56b33e3b00030dbfd82ea2f8ddbeb1d04bac86815ebe0b9d084d60edf56b15e74589892dce86962f611a4313120b738dddfd38d20b443570197dc795020ecf541601ef9a5618869febf769dd50261849a47e170ba166b97e76a0261d0dc1fb3e2646595f1c8b49057d94f10f7b5e35ead0a38", @ANYRES8=0x0], 0x3, 0x21f, &(0x7f0000000940)="$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") mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x810004, &(0x7f0000000ac0)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x04\xc3\x00\x00\x00\x00\x00\x00\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x80, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYRES8=0x0], 0x3, 0x21f, &(0x7f0000000940)="$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") mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x810004, &(0x7f0000000ac0)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x04\xc3\x00\x00\x00\x00\x00\x00\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x00\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfd\x05\x00\x00\x00\x00\x00\x80\x00\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94uu_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18A\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x05\x00\x00\x000\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xce\x00\x00\x00\xe8\vq+\xbb\xc7\xaf\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x1, 0x0) ppoll(&(0x7f0000000340)=[{r1, 0x282}], 0x1, &(0x7f0000000040), 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r2) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1e}, 0x48) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x4, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x8, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0x3, 0xffffffffffffffff, 0xb) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000300000a50000000060a010400000000000000000a0000040900010073797a31000000000900020073797a32000000002400048020000180080001006c6f6700140002800600014000030000070002"], 0x78}, 0x1, 0x0, 0x0, 0x4004840}, 0x24044010) 1.942875317s ago: executing program 3 (id=8704): r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000780)=[{{0x0, 0x0, 0x0}, 0x3}], 0x1, 0x120, 0x0) 1.935102918s ago: executing program 3 (id=8705): syz_io_uring_setup(0x82e, &(0x7f0000000300)={0x0, 0xcd1d, 0x10100, 0x0, 0x75}, 0x0, 0x0) syz_usbip_server_init(0x1) r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800, 0x0, 0x3, 0x9}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0xffffffc3, 0xc) sendmmsg(r0, &(0x7f0000001500)=[{{&(0x7f0000000180)=@l2tp6={0xa, 0x500, 0x80000, @remote, 0x0, 0x3}, 0x80, 0x0}, 0x5b4}, {{&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x7080000, @ipv4={'\x00', '\xff\xff', @loopback}, 0x7, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="080100000000000029"], 0x108}}], 0x2, 0xc040) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000030000000200000002"], 0x48) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0a000000020000003f0000004000000042"], 0x50) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4042, 0x2a) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000a80), 0x1007, r1}, 0x38) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'macvlan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x20000000000000fe, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', r3, @fallback=0x35, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = msgget$private(0x0, 0x7ac) msgrcv(r4, 0x0, 0x0, 0x3, 0x2000) msgrcv(r4, 0x0, 0x0, 0xe4b43f0e2aa28c96, 0x2000) msgsnd(r4, &(0x7f0000000240)={0x3}, 0x8, 0x8fa2496c381b7ad5) r5 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) 1.826227257s ago: executing program 8 (id=8709): r0 = syz_io_uring_setup(0x10f, &(0x7f0000000380)={0x0, 0xb5ac, 0x400, 0x0, 0x4003}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000440)=0xfffffffc, 0x0, 0x4) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f00000006c0)={0x0, 0xda, "3d49f329e48d96ad0fa57e47d4db3d62fc46ff3d1b2bd678aeafac2c539805dbe3395d958b44da4219f22b871f23efce5113fb8a4d920915f2afc0c7b787e537a7c6b160f250625ed8f48d807c7fc14330de9dd5d198a58c9ceb3ea4018c1bcf214ea20bd0d38bad8577710d3e660794d72e09d37dc2b2368351da43255b1ed7f0b0bebc2b16e1170000000000000000b779584b90d64aa825503bd1a5012e3bb1b1a8f4767c77bb592ea4a32889901f86e5eabbb3ba78ea1955cf768173c094b4645bc32498fe129f1fe6a7f6f4e05726d5cb96a3f241b5f9e4"}, &(0x7f00000000c0)=0xe2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000600)={r5, @in={{0x2, 0x4e22, @loopback}}}, 0x84) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_LINK_TIMEOUT={0xf, 0x14, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x1, 0x1, 0x1}) getpid() sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x20040880) r6 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r6, 0x0, 0xffffffffffffff69, 0x44854, &(0x7f0000000540)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_mr_cache\x00') getdents(r7, &(0x7f00000000c0)=""/49, 0x31) getdents64(r7, 0x0, 0x43) r8 = socket$kcm(0xa, 0x2, 0x0) recvmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40018162) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000280)) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_SHUTDOWN={0x22, 0x9, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x1, {0x0, r3}}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000106}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(0x0, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x1) unshare(0x68040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0xfdffa000) io_uring_enter(r0, 0x3516, 0x0, 0x0, 0x0, 0x0) 1.367188938s ago: executing program 5 (id=8715): syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x236, &(0x7f0000000300)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='mnt\x00', 0x0, 0x20) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x40e8662e, 0x0) accept4$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32], 0x48) r1 = socket$kcm(0x21, 0x2, 0x2) sendmsg$inet(r1, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@ip_pktinfo={{0x1c, 0x110, 0xd, {0x0, @loopback=0x7f000300, @empty}}}], 0x20}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000bc0)='./file1\x00', 0x84010, &(0x7f0000000100)={[{@quota}]}, 0x9, 0xbaf, &(0x7f0000002f00)="$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") open(&(0x7f00000001c0)='./file1\x00', 0x4000, 0x16) socket(0x28, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000bc0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r2, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000001040)={&(0x7f0000000f00)={0x20, r3, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x14) r4 = socket$nl_generic(0x11, 0x3, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @random="9d80555ee810", @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}, @multicast1}, {0x22, 0x7c, 0x0, @multicast2}}}}}, 0x0) sendmsg(r4, &(0x7f0000000640)={&(0x7f00000000c0)=@caif=@dgm={0x25, 0xd}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000000)="4ba72c4cfd81685544f46c3f0800", 0x36}], 0x2, 0x0, 0x0, 0x11000000}, 0x0) 1.200828503s ago: executing program 5 (id=8717): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@ipv4_newrule={0x1c, 0x20, 0x301, 0x0, 0x25dfdbfe, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5}}, 0x1c}}, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) poll(0x0, 0x0, 0x3ff) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0x8) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000500)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x80, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYRES8=0x0], 0x3, 0x21f, &(0x7f0000000940)="$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") mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x810004, &(0x7f0000000ac0)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x04\xc3\x00\x00\x00\x00\x00\x00\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004180)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="3cf19f47c01e1ea38d7a2dfd00"/23, @ANYRES32=r3, @ANYRESDEC=r0], 0x3c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) syz_clone3(&(0x7f0000000080)={0x801400, &(0x7f0000000040)=0xffffffffffffffff, 0x0, 0x0, {0x29}, 0x0, 0x0, 0x0, 0x0}, 0x58) r5 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) close(r5) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x2c, 0xfe, 0x0, 0x0, 0x0, 0x7, 0x1f0519, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1, 0x10001}, 0x6025, 0x4005, 0xb, 0x3, 0x2, 0x20005, 0x7f, 0x0, 0x0, 0x0, 0x20000008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x4080, &(0x7f0000000000)="$eJzszz9KA0EcBeC3JpEoUbAWxEWwFO2scotcQDyCjY0G03kMwSZ4AG/gkUwjI2GX1cRWQeX7in37e/tnZsKvcP/a3lwuL5td/3K9+t5Om88XT3tJDuu8lVIyTNJf++WiJKdnGWwPNzJKcvV11cn8e08BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD8JdP1orc6Pra5n9nNOOelcXvXS9U+qU+S3Y8PFiXZ6qZ+E5P5D2wdAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPjvSillmdWnbpCk35RVMu36UR6OMhsfVBkm9fE7+3NoAwAIAwEwwTAh87A3CvEJoQPU3ama/uf/lP3Omf/qpGWNphUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXHbgQAAAAAAAyP+1EaqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqwAwckAAAAAIL+v25HoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMBGAQAA//88nie/") socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x1, 0x7}, 0x2, 0x0, 0x10ffe, 0x3, 0x2, 0x80000011, 0x3, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r6, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x84, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) 784.87562ms ago: executing program 1 (id=8724): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f00000000c0)={&(0x7f0000000140)={0x2c, r1, 0xd1bd17c4b9ef5e5b, 0x70bd26, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0x14}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x90) 784.41809ms ago: executing program 1 (id=8725): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x10, &(0x7f0000000600)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}]}, &(0x7f0000000300)='GPL\x00', 0x8, 0xff8, &(0x7f0000001e00)=""/4088}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x16, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="dbaa00fea0000000711096000000000095"], &(0x7f0000000480)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x790f}, 0x94) 767.916361ms ago: executing program 8 (id=8726): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x33}}}, 0x0, 0x0, 0x4, 0x0, "e83ae75240c2d658ec87bb53679fd0450078548ceb6c4414fab0919616e19aecedec1b76aea5922406b64cddaeb9d339ba3c01c2c7d0df8e61740b9af2d4e499d58654a4cf0fa0ce1f830c3279cffcfd"}, 0xd8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) (fail_nth: 3) 694.587368ms ago: executing program 1 (id=8727): r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@isdn, &(0x7f0000000080)=0x80, 0x80800) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="8500000008000000730a00ff000000003d00000000000000950000000000000018100000", @ANYRES32, @ANYBLOB="10000000000000250500000000000000b50000a9a12b82b5a22f2649c5a7cbe9acb3197092b20000000000"], &(0x7f0000000140)='GPL\x00', 0xa, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0xc4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e}, 0x2d) syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="24011000", @ANYBLOB="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"], 0x124}, 0x1, 0x0, 0x0, 0x40000}, 0x4001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000140), 0x2401, 0x0) unshare(0x24020400) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x30, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) syz_open_dev$tty1(0xc, 0x4, 0x1) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, 0x0) unshare(0x28000600) clock_adjtime(0xffffffd3, &(0x7f0000000000)={0xfffc, 0x6, 0xffffffffffffffff, 0x8000000000000000, 0x7, 0x9, 0x651, 0xc, 0x8000009657, 0xffeffffffffffffd, 0x62db, 0x9a3f, 0x10, 0xb, 0x80000000000000, 0xcc0, 0x6, 0x1, 0x94d6, 0x0, 0x3, 0xfffffffffffffffb, 0x0, 0xffffffffffff9d06, 0x3, 0x9}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000e40)=@mangle={'mangle\x00', 0x64, 0x6, 0x500, 0x0, 0x270, 0xd0, 0x340, 0x0, 0x430, 0x430, 0x430, 0x430, 0x430, 0x6, 0x0, {[{{@ipv6={@private0, @private1, [], [], 'veth1\x00', 'veth1_vlan\x00'}, 0x0, 0xa8, 0xd0, 0x0, {0x0, 0x3a010000}}, @HL={0x28}}, {{@ipv6={@private1, @loopback, [], [], 'tunl0\x00', 'bridge_slave_1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x430}}, {{@ipv6={@private0, @remote, [], [], 'veth0_to_team\x00', 'tunl0\x00', {}, {}, 0x11, 0x1, 0x3, 0x44}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@SYNPROXY={0x28}}, {{@ipv6={@loopback, @private2, [], [], 'syzkaller1\x00', 'veth0_to_batadv\x00'}, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, 'vlan0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x560) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000001d80)=@broute={'broute\x00', 0x20, 0x0, 0x90, [0x0, 0x1100000000000000, 0x0, 0x0, 0x0, 0x2000000000c0], 0x11, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000003c0)={'wlan1\x00'}) sendmsg$NL80211_CMD_ABORT_SCAN(r0, &(0x7f0000000340)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f0000000480)={0x14, r4, 0x2, 0x70bd2d, 0x25dfdbf9, {{}, {@void, @void}}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x840}, 0x20000044) r6 = syz_io_uring_setup(0x332f, &(0x7f0000000400)={0x0, 0x6853, 0x800, 0x5, 0x39}, &(0x7f0000000080), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_PBUF_RING(r6, 0x16, &(0x7f0000000900)={&(0x7f0000003000), 0x1, 0x3}, 0x1) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_PBUF_RING(r6, 0x17, &(0x7f0000000f40)={0x0, 0x0, 0x3}, 0x1) mremap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f000000b000/0x1000)=nil) r7 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_MFC(r7, 0x0, 0xcc, &(0x7f0000000140)={@multicast2, @multicast1, 0x0, "aaa517d60f2811d48c8a2cc60c4380bc23b510d442ff13482864280a9c0f4eb5", 0x0, 0x3e8}, 0x3c) 694.298528ms ago: executing program 8 (id=8728): r0 = syz_io_uring_setup(0x10f, &(0x7f0000000380)={0x0, 0xb5ac, 0x400, 0x0, 0x4003}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000440)=0xfffffffc, 0x0, 0x4) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f00000006c0)={0x0, 0xda, "3d49f329e48d96ad0fa57e47d4db3d62fc46ff3d1b2bd678aeafac2c539805dbe3395d958b44da4219f22b871f23efce5113fb8a4d920915f2afc0c7b787e537a7c6b160f250625ed8f48d807c7fc14330de9dd5d198a58c9ceb3ea4018c1bcf214ea20bd0d38bad8577710d3e660794d72e09d37dc2b2368351da43255b1ed7f0b0bebc2b16e1170000000000000000b779584b90d64aa825503bd1a5012e3bb1b1a8f4767c77bb592ea4a32889901f86e5eabbb3ba78ea1955cf768173c094b4645bc32498fe129f1fe6a7f6f4e05726d5cb96a3f241b5f9e4"}, &(0x7f00000000c0)=0xe2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000000600)={r5, @in={{0x2, 0x4e22, @loopback}}}, 0x84) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_LINK_TIMEOUT={0xf, 0x14, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x1, 0x1, 0x1}) getpid() sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x20040880) r6 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r6, 0x0, 0xffffffffffffff69, 0x44854, &(0x7f0000000540)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c) r7 = syz_open_procfs(0x0, &(0x7f0000000240)='net/ip_mr_cache\x00') getdents(r7, &(0x7f00000000c0)=""/49, 0x31) getdents64(r7, 0x0, 0x43) r8 = socket$kcm(0xa, 0x2, 0x0) recvmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40018162) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000280)) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_SHUTDOWN={0x22, 0x9, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x0, 0x1, {0x0, r3}}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000106}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(0x0, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x1) unshare(0x68040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0xfdffa000) io_uring_enter(r0, 0x3516, 0x0, 0x0, 0x0, 0x0) 520.244123ms ago: executing program 1 (id=8731): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x18, r1, 0x301, 0x70bd26, 0x25dfdbfb, {0x1c}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xc081}, 0x40006) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x16, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) socket(0x400000000010, 0x3, 0x0) socket$unix(0x1, 0x5, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x31) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="b00000001a007f029e78f6030f7a0a762353bfb89fd8c902317bab30f89f080aaaaeb9d8091c815dcf03e14e877733fff4fe20a5be870f576b162e7de2d02673e789a4950c9cdc206e086fd0dc8ca9afcd9d525146add31b7bc77c26d8982be29d889d1e35355848794ca3f8b38aef1e114ab9fbebe9c6609e64b1e5a3b0c81c6f8144e74fe12780ca46c1a6c04ad73c9d44b605f9000000000000000000", 0x9e}, {&(0x7f00000001c0)="68cabf2dfb58fc0af787a8ffff0200258f00", 0x12}], 0x2}, 0x0) r5 = fsmount(0xffffffffffffffff, 0x0, 0x0) fchdir(r5) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) 489.133146ms ago: executing program 9 (id=8732): socket$packet(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="27050200991514000600012fb96d", 0xe}], 0x1}, 0x30040805) 486.730306ms ago: executing program 3 (id=8733): perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x4, 0x40008, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x100000001}, 0x61c4, 0x2, 0x800003, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x1) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x7, 0x4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x400000, @empty, 0xd}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@multicast, @multicast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @multicast1=0xac14140f}, {0x4e21, 0x4e20, 0x8}}}}}, 0x0) r1 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000780)={@broadcast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00 \x00', 0x18, 0x3a, 0xff, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, @local, {[], @mld={0x187, 0x0, 0x0, 0x0, 0x0, @local}}}}}}, 0x0) openat(0xffffffffffffff9c, 0x0, 0x24b01, 0x0) setreuid(0xffffffffffffffff, 0xee01) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x40, 0x0) stat(0x0, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e22, 0x0, @local, 0x1000}}, 0x7, 0x9, 0x10, 0x9, 0xfff}, &(0x7f00000002c0)=0x98) setsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000300)={r2, 0xffffff80}, 0x8) setpriority(0x0, 0x1, 0xa7a8) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)=0x0) timer_settime(r4, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) syz_open_procfs(0x0, &(0x7f0000002380)='net/ip_mr_cache\x00') futex(&(0x7f000000cffc)=0x1, 0x86, 0xfffffffe, 0x0, 0x0, 0xfffffffc) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_int(r5, 0x29, 0x8, 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x2) gettid() futex(&(0x7f000000cffc)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) 447.61177ms ago: executing program 1 (id=8734): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x18, r1, 0x301, 0x70bd26, 0x25dfdbfb, {0x1c}, [@ETHTOOL_A_LINKMODES_HEADER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0xc081}, 0x40006) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x16, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000850000000800000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) socket(0x400000000010, 0x3, 0x0) socket$unix(0x1, 0x5, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x31) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r3, @ANYBLOB], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$kcm(0x10, 0x400000002, 0x0) sendmsg$inet(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="b00000001a007f029e78f6030f7a0a762353bfb89fd8c902317bab30f89f080aaaaeb9d8091c815dcf03e14e877733fff4fe20a5be870f576b162e7de2d02673e789a4950c9cdc206e086fd0dc8ca9afcd9d525146add31b7bc77c26d8982be29d889d1e35355848794ca3f8b38aef1e114ab9fbebe9c6609e64b1e5a3b0c81c6f8144e74fe12780ca46c1a6c04ad73c9d44b605f9000000000000000000", 0x9e}, {&(0x7f00000001c0)="68cabf2dfb58fc0af787a8ffff0200258f00", 0x12}], 0x2}, 0x0) r5 = fsmount(0xffffffffffffffff, 0x0, 0x0) fchdir(r5) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) 447.14374ms ago: executing program 9 (id=8735): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x3, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffc}, {0x85, 0x0, 0x0, 0x73}}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="000000000100000000001a000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) clock_nanosleep(0x7, 0x0, &(0x7f00000000c0), &(0x7f0000000140)) 391.006525ms ago: executing program 9 (id=8736): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f00000000c0)={&(0x7f0000000140)={0x2c, r1, 0xd1bd17c4b9ef5e5b, 0x70bd26, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0x14}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x90) 390.684285ms ago: executing program 1 (id=8737): pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) splice(r2, 0x0, r1, 0x0, 0xffffffffffff8000, 0x0) write$P9_RLERRORu(r1, 0x0, 0xe) 390.112635ms ago: executing program 9 (id=8738): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18020000fcffffff00000000000000008500000036000000180100006420002500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000001800000850000000600000095"], &(0x7f00000001c0)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket(0x2a, 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r1, r3, 0x25, 0x0, @void}, 0x10) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="259a53f271a76d2673004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0x100120}], 0x1}, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 363.648577ms ago: executing program 8 (id=8739): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='oom_adj\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ftruncate(r1, 0x5) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1e000000f7ffffff010000000600000000880200", @ANYRES32=r1, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03000800a584b500040000000c00000000000000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00'], 0x50) fchdir(r0) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0x80000701) 301.202773ms ago: executing program 8 (id=8740): syz_io_uring_setup(0x82e, &(0x7f0000000300)={0x0, 0xcd1d, 0x10100, 0x0, 0x75}, 0x0, 0x0) syz_usbip_server_init(0x1) r0 = socket$inet6(0xa, 0x3, 0x5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x800, 0x0, 0x3, 0x9}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0xffffffc3, 0xc) sendmmsg(r0, &(0x7f0000001500)=[{{&(0x7f0000000180)=@rxrpc=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e23, @multicast2}}, 0x80, 0x0}, 0x5b4}, {{&(0x7f0000000040)=@l2tp6={0xa, 0x0, 0x7080000, @empty, 0x7, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="080100000000000029"], 0x108}}], 0x2, 0xc040) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000030000000200000002"], 0x48) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0a000000020000003f0000004000000042"], 0x50) r2 = open(&(0x7f0000000000)='./file0\x00', 0x4042, 0x2a) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000a80), 0x1007, r1}, 0x38) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'macvlan0\x00', 0x0}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES16=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRES32=r4], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r5}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x20000000000000fe, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', r3, @fallback=0x35, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = msgget$private(0x0, 0x7ac) r7 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) bind$packet(r7, &(0x7f0000000240)={0x11, 0x16, r8, 0x1, 0x5, 0x6, @remote}, 0x14) bind$packet(r7, &(0x7f0000000040)={0x11, 0x2, 0x0, 0x1, 0xd, 0x6, @broadcast}, 0x14) msgrcv(r6, 0x0, 0x0, 0x3, 0x2000) msgrcv(r6, 0x0, 0x0, 0xe4b43f0e2aa28c96, 0x2000) msgsnd(r6, &(0x7f0000000380)=ANY=[@ANYBLOB="03de00000000000093b09432e70b2277b1077869af23fab6b017b8895c38c80795dca05149f7e749c056646524bfc72b913aab7ed8b6e0c964157944dab5b43455a3479d589da01814ec9805ecca60b37a13c4d009844635f99703af20de8baf842a433a1a1976014b6a3856ac93f64964984a336be74806a5934231eb1df7678fa57aa800000000000000"], 0x8, 0x8fa2496c381b7ad5) perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x4, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 257.969757ms ago: executing program 9 (id=8741): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0x100120}], 0x1}, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 226.603389ms ago: executing program 9 (id=8742): r0 = syz_io_uring_setup(0x10f, &(0x7f0000000380)={0x0, 0xb5ac, 0x400, 0x0, 0x4003}, &(0x7f0000000100)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000440)=0xfffffffc, 0x0, 0x4) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000006c0)={0x0, 0xda, "3d49f329e48d96ad0fa57e47d4db3d62fc46ff3d1b2bd678aeafac2c539805dbe3395d958b44da4219f22b871f23efce5113fb8a4d920915f2afc0c7b787e537a7c6b160f250625ed8f48d807c7fc14330de9dd5d198a58c9ceb3ea4018c1bcf214ea20bd0d38bad8577710d3e660794d72e09d37dc2b2368351da43255b1ed7f0b0bebc2b16e1170000000000000000b779584b90d64aa825503bd1a5012e3bb1b1a8f4767c77bb592ea4a32889901f86e5eabbb3ba78ea1955cf768173c094b4645bc32498fe129f1fe6a7f6f4e05726d5cb96a3f241b5f9e4"}, &(0x7f00000000c0)=0xe2) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000600)={r3, @in={{0x2, 0x4e22, @loopback}}}, 0x84) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_LINK_TIMEOUT={0xf, 0x14, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x1, 0x1, 0x1}) getdents64(0xffffffffffffffff, 0x0, 0x43) r4 = syz_pidfd_open(0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000080)=0x1000000, &(0x7f0000000180)}, 0x20) ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f0000000280)) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x9}, 0x106200, 0x10004, 0x20da, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000106}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) unshare(0x68040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0xfdffa000) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000500)={'nat\x00', 0x0, [0x7f, 0x7, 0x20000004, 0x3, 0x100000c]}, 0x0) 212.33457ms ago: executing program 5 (id=8743): r0 = socket(0x200000000000011, 0x2, 0xd) bind$packet(r0, 0x0, 0x0) 192.914012ms ago: executing program 5 (id=8744): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r0 = socket$kcm(0x23, 0x2, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@multicast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xd}, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x2, 0x1c, 0x3, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010300, @local}, @info_reply={0xd, 0x0, 0x0, 0xfffe, 0x9}}}}}, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000000)=@phonet, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)="b8", 0x1ff48}], 0x2}, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x2) syz_emit_ethernet(0x10b, &(0x7f0000000180)={@multicast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1b}, @val={@void, {0x8100, 0x5, 0x0, 0x1}}, {@llc={0x4, {@snap={0xab, 0x0, "8b5b", "b0bfbe", 0x1b, "29b0987f6a040161924539aacd5a1ea8e3eb7b1ad567fa26b3188b15dc480105b3be68a2cf7dfddd1c3dc4043dcc3378c1c633b392fdffbf36219f835c4d9ae63d703840dbfd00ecdf945813086c47d26a1da729d6a8f5b56153144bbc1def99456c392d7449dcbdd605fa15acc6610ed60b006392f16c103b3fbffc8215050b35b6d58a033b5258c289c1d0374ae94553c93d6800e549c8729be385660e385daedb0c47627bf27181b9b1ebe9481cfa8d91b36313407ada5261519dbdd7e8ebab871435cfaeadb93747ffb5ca4365499111bc7c20f85349aee9b4945566ec32370b1879658e073a5181f3e56233a6ac"}}}}}, &(0x7f0000000100)={0x1, 0x4, [0xafb, 0x95a, 0x5c0, 0x158]}) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x5319, 0x0) 161.456835ms ago: executing program 5 (id=8745): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x3, 0xb, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffc}, {0x85, 0x0, 0x0, 0x73}}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="000000000100000000001a000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) (fail_nth: 3) 0s ago: executing program 5 (id=8746): socket$packet(0x11, 0x3, 0x300) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="27050200991514000600012fb96d", 0xe}], 0x1}, 0x30040805) kernel console output (not intermixed with test programs): /0xd0 [ 1000.857890][ T1361] dump_stack+0x15/0x1b [ 1000.857960][ T1361] should_fail_ex+0x263/0x280 [ 1000.858065][ T1361] should_fail+0xb/0x20 [ 1000.858155][ T1361] should_fail_usercopy+0x1a/0x20 [ 1000.858256][ T1361] _copy_from_iter+0xcf/0xea0 [ 1000.858286][ T1361] ? alloc_pages_mpol+0x217/0x260 [ 1000.858392][ T1361] copy_page_from_iter+0x178/0x2a0 [ 1000.858417][ T1361] tun_get_user+0xbbd/0x27c0 [ 1000.858456][ T1361] ? ref_tracker_alloc+0x1f2/0x2f0 [ 1000.858556][ T1361] tun_chr_write_iter+0x15e/0x210 [ 1000.858611][ T1361] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 1000.858691][ T1361] vfs_write+0x5a6/0x9f0 [ 1000.858823][ T1361] ksys_write+0xdc/0x1a0 [ 1000.858860][ T1361] __x64_sys_write+0x40/0x50 [ 1000.858954][ T1361] x64_sys_call+0x27e1/0x3020 [ 1000.859025][ T1361] do_syscall_64+0x12c/0x370 [ 1000.859086][ T1361] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1000.859114][ T1361] RIP: 0033:0x7f65278fcece [ 1000.859184][ T1361] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1000.859207][ T1361] RSP: 002b:00007f6526375fb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1000.859240][ T1361] RAX: ffffffffffffffda RBX: 00007f65263766c0 RCX: 00007f65278fcece [ 1000.859278][ T1361] RDX: 0000000000000060 RSI: 0000200000000000 RDI: 00000000000000c8 [ 1000.859297][ T1361] RBP: 00007f6526376090 R08: 0000000000000000 R09: 0000000000000000 [ 1000.859313][ T1361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1000.859328][ T1361] R13: 00007f6527bb6128 R14: 00007f6527bb6090 R15: 00007ffe58f72ff8 [ 1000.859349][ T1361] [ 1000.861059][ T1363] netlink: 12 bytes leftover after parsing attributes in process `syz.8.8079'. [ 1001.220301][ T28] audit: type=1400 audit(1771437884.897:4145): avc: denied { mount } for pid=1368 comm="syz.3.8082" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1001.252261][ T1373] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1001.263324][ T1373] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1001.275346][ T28] audit: type=1400 audit(1771437884.953:4146): avc: denied { bind } for pid=1368 comm="syz.3.8082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1001.415362][ T28] audit: type=1400 audit(1771437885.056:4147): avc: denied { ioctl } for pid=1371 comm="syz.8.8083" path="socket:[106099]" dev="sockfs" ino=106099 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 1001.641599][ T1389] SELinux: security_context_str_to_sid (8Ӎ CWyP A`aivaGpkjadeȴWO^ [ 1001.641599][ T1389] 8) failed with errno=-22 [ 1001.771661][ T1381] netlink: 32 bytes leftover after parsing attributes in process `syz.3.8087'. [ 1001.795901][ T1381] netlink: 32 bytes leftover after parsing attributes in process `syz.3.8087'. [ 1001.971640][ T1401] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8093'. [ 1001.990137][ T28] audit: type=1326 audit(1771437885.617:4148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1400 comm="syz.9.8093" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f061f83c629 code=0x7ffc0000 [ 1002.017803][ T1401] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8093'. [ 1002.026830][ T1401] netlink: 48 bytes leftover after parsing attributes in process `syz.9.8093'. [ 1002.040716][ T28] audit: type=1326 audit(1771437885.617:4149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1400 comm="syz.9.8093" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f061f83c629 code=0x7ffc0000 [ 1002.071152][ T1401] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8093'. [ 1002.103822][ T28] audit: type=1326 audit(1771437885.617:4150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1400 comm="syz.9.8093" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f061f83c629 code=0x7ffc0000 [ 1002.127888][ T1381] usb usb7: usbfs: process 1381 (syz.3.8087) did not claim interface 0 before use [ 1002.142253][ T28] audit: type=1326 audit(1771437885.617:4151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1400 comm="syz.9.8093" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f061f83c629 code=0x7ffc0000 [ 1002.166977][ T28] audit: type=1326 audit(1771437885.617:4152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1400 comm="syz.9.8093" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f061f83c629 code=0x7ffc0000 [ 1002.191458][ T3780] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 1002.197704][ T28] audit: type=1326 audit(1771437885.617:4153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1400 comm="syz.9.8093" exe="/root/syz-executor" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7f061f83c629 code=0x7ffc0000 [ 1002.221716][ T28] audit: type=1326 audit(1771437885.617:4154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1400 comm="syz.9.8093" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f061f83c629 code=0x7ffc0000 [ 1003.127794][ T1444] SELinux: security_context_str_to_sid (8Ӎ CWyP A`aivaGpkjadeȴWO^ [ 1003.127794][ T1444] 8) failed with errno=-22 [ 1003.132924][ T1449] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1003.152353][ T1449] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1003.226596][ T1454] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8109'. [ 1003.634305][ T1462] FAULT_INJECTION: forcing a failure. [ 1003.634305][ T1462] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1003.667495][ T1462] CPU: 1 UID: 0 PID: 1462 Comm: syz.1.8114 Tainted: G W syzkaller #0 PREEMPT(full) [ 1003.667538][ T1462] Tainted: [W]=WARN [ 1003.667548][ T1462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1003.667601][ T1462] Call Trace: [ 1003.667610][ T1462] [ 1003.667621][ T1462] __dump_stack+0x1d/0x30 [ 1003.667655][ T1462] dump_stack_lvl+0x95/0xd0 [ 1003.667711][ T1462] dump_stack+0x15/0x1b [ 1003.667753][ T1462] should_fail_ex+0x263/0x280 [ 1003.667851][ T1462] ? __pfx_ucma_create_id+0x10/0x10 [ 1003.667905][ T1462] should_fail+0xb/0x20 [ 1003.667928][ T1462] should_fail_usercopy+0x1a/0x20 [ 1003.667955][ T1462] _copy_from_user+0x1c/0xb0 [ 1003.667987][ T1462] ucma_create_id+0x7f/0x280 [ 1003.668032][ T1462] ? __pfx_ucma_create_id+0x10/0x10 [ 1003.668071][ T1462] ucma_write+0x1c9/0x260 [ 1003.668161][ T1462] vfs_writev+0x42b/0x900 [ 1003.668189][ T1462] ? __pfx_ucma_write+0x10/0x10 [ 1003.668238][ T1462] do_writev+0xe9/0x210 [ 1003.668265][ T1462] __x64_sys_writev+0x45/0x50 [ 1003.668373][ T1462] x64_sys_call+0x1c0c/0x3020 [ 1003.668405][ T1462] do_syscall_64+0x12c/0x370 [ 1003.668482][ T1462] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1003.668511][ T1462] RIP: 0033:0x7f652793c629 [ 1003.668532][ T1462] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1003.668555][ T1462] RSP: 002b:00007f6526397028 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1003.668577][ T1462] RAX: ffffffffffffffda RBX: 00007f6527bb5fa0 RCX: 00007f652793c629 [ 1003.668661][ T1462] RDX: 0000000000000002 RSI: 0000200000000040 RDI: 0000000000000006 [ 1003.668679][ T1462] RBP: 00007f6526397090 R08: 0000000000000000 R09: 0000000000000000 [ 1003.668696][ T1462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1003.668712][ T1462] R13: 00007f6527bb6038 R14: 00007f6527bb5fa0 R15: 00007ffe58f72ff8 [ 1003.668731][ T1462] [ 1004.145114][ T1479] netlink: 16 bytes leftover after parsing attributes in process `syz.1.8120'. [ 1004.269713][ T1486] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1004.283014][ T1488] nfs: Unknown parameter '' [ 1004.289445][ T1486] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1004.757494][ T1508] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1004.766286][ T1508] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1005.442231][ T1520] tipc: Started in network mode [ 1005.447246][ T1520] tipc: Node identity dae813c354cc, cluster identity 4711 [ 1005.454666][ T1520] tipc: Enabled bearer , priority 0 [ 1005.464374][ T1520] tipc: Resetting bearer [ 1005.472574][ T1519] tipc: Disabling bearer [ 1005.882492][ T1522] chnl_net:caif_netlink_parms(): no params data found [ 1005.972491][ T1522] bridge0: port 1(bridge_slave_0) entered blocking state [ 1005.987329][ T1522] bridge0: port 1(bridge_slave_0) entered disabled state [ 1005.995044][ T1522] bridge_slave_0: entered allmulticast mode [ 1006.001672][ T1522] bridge_slave_0: entered promiscuous mode [ 1006.024694][ T1522] bridge0: port 2(bridge_slave_1) entered blocking state [ 1006.039593][ T1522] bridge0: port 2(bridge_slave_1) entered disabled state [ 1006.047407][ T1522] bridge_slave_1: entered allmulticast mode [ 1006.054106][ T1522] bridge_slave_1: entered promiscuous mode [ 1006.074533][ T1522] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1006.088627][ T1522] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1006.173525][ T1522] team0: Port device team_slave_0 added [ 1006.180453][ T1522] team0: Port device team_slave_1 added [ 1006.190507][ T3833] netdevsim netdevsim8 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1006.211295][ T3833] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1006.239779][ T1522] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1006.252182][ T1522] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1006.278858][ T1522] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1006.306108][ T3833] netdevsim netdevsim8 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1006.315126][ T1555] __nla_validate_parse: 2 callbacks suppressed [ 1006.315141][ T1555] netlink: 56 bytes leftover after parsing attributes in process `syz.3.8136'. [ 1006.332388][ T1555] netlink: 20 bytes leftover after parsing attributes in process `syz.3.8136'. [ 1006.334212][ T3833] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1006.353138][ T1522] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1006.360498][ T1522] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1006.387216][ T1522] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1006.420975][ T1522] hsr_slave_0: entered promiscuous mode [ 1006.427242][ T1522] hsr_slave_1: entered promiscuous mode [ 1006.433586][ T1522] debugfs: 'hsr0' already exists in 'hsr' [ 1006.439386][ T1522] Cannot create hsr debugfs directory [ 1006.449884][ T3833] netdevsim netdevsim8 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1006.460432][ T3833] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1006.513459][ T3833] netdevsim netdevsim8 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1006.524080][ T3833] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1006.579689][ T1562] FAULT_INJECTION: forcing a failure. [ 1006.579689][ T1562] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1006.601273][ T1562] CPU: 0 UID: 0 PID: 1562 Comm: syz.3.8138 Tainted: G W syzkaller #0 PREEMPT(full) [ 1006.601314][ T1562] Tainted: [W]=WARN [ 1006.601335][ T1562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1006.601348][ T1562] Call Trace: [ 1006.601354][ T1562] [ 1006.601414][ T1562] __dump_stack+0x1d/0x30 [ 1006.601475][ T1562] dump_stack_lvl+0x95/0xd0 [ 1006.601508][ T1562] dump_stack+0x15/0x1b [ 1006.601554][ T1562] should_fail_ex+0x263/0x280 [ 1006.601620][ T1562] should_fail+0xb/0x20 [ 1006.601641][ T1562] should_fail_usercopy+0x1a/0x20 [ 1006.601669][ T1562] _copy_from_user+0x1c/0xb0 [ 1006.601773][ T1562] __copy_msghdr+0x244/0x300 [ 1006.601799][ T1562] ___sys_sendmsg+0x10c/0x1e0 [ 1006.601822][ T1562] ? path_openat+0x1b01/0x2050 [ 1006.601926][ T1562] __sys_sendmmsg+0x185/0x320 [ 1006.601965][ T1562] __x64_sys_sendmmsg+0x57/0x70 [ 1006.602197][ T1562] x64_sys_call+0x27aa/0x3020 [ 1006.602233][ T1562] do_syscall_64+0x12c/0x370 [ 1006.602275][ T1562] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1006.602374][ T1562] RIP: 0033:0x7f1179aac629 [ 1006.602395][ T1562] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1006.602431][ T1562] RSP: 002b:00007f11784ff028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1006.602452][ T1562] RAX: ffffffffffffffda RBX: 00007f1179d25fa0 RCX: 00007f1179aac629 [ 1006.602465][ T1562] RDX: 0000000000000001 RSI: 0000200000001500 RDI: 0000000000000004 [ 1006.602561][ T1562] RBP: 00007f11784ff090 R08: 0000000000000000 R09: 0000000000000000 [ 1006.602578][ T1562] R10: 000000000000c040 R11: 0000000000000246 R12: 0000000000000001 [ 1006.602594][ T1562] R13: 00007f1179d26038 R14: 00007f1179d25fa0 R15: 00007ffcf41a9608 [ 1006.602617][ T1562] [ 1006.828088][ T3833] bridge_slave_1: left allmulticast mode [ 1006.837750][ T3833] bridge_slave_1: left promiscuous mode [ 1006.843696][ T3833] bridge0: port 2(bridge_slave_1) entered disabled state [ 1007.000175][ T3833] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1007.010368][ T3833] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1007.023734][ T3833] bond0 (unregistering): Released all slaves [ 1007.032030][ T3833] bond1 (unregistering): Released all slaves [ 1007.074910][ T3833] tipc: Left network mode [ 1007.082720][ T3833] hsr_slave_0: left promiscuous mode [ 1007.088730][ T3833] hsr_slave_1: left promiscuous mode [ 1007.094790][ T3833] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1007.102291][ T3833] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1007.111137][ T3833] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1007.123454][ T3833] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1007.140720][ T3833] veth1_macvtap: left promiscuous mode [ 1007.146336][ T3833] veth0_macvtap: left promiscuous mode [ 1007.158697][ T3833] veth1_vlan: left allmulticast mode [ 1007.168286][ T3833] veth1_vlan: left promiscuous mode [ 1007.175006][ T3833] veth0_vlan: left promiscuous mode [ 1007.213006][ T1579] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8141'. [ 1007.270543][ T3833] team0 (unregistering): Port device macvlan1 removed [ 1007.339993][ T3833] team0 (unregistering): Port device team_slave_1 removed [ 1007.350746][ T3833] team0 (unregistering): Port device team_slave_0 removed [ 1007.557224][ T1602] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1007.565967][ T1602] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1007.636330][ T1607] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8144'. [ 1007.999627][ T1609] netlink: 'syz.5.8147': attribute type 21 has an invalid length. [ 1007.999801][ T1623] netlink: 56 bytes leftover after parsing attributes in process `syz.1.8148'. [ 1008.007777][ T1609] netlink: 132 bytes leftover after parsing attributes in process `syz.5.8147'. [ 1008.035739][ T1627] netlink: 56 bytes leftover after parsing attributes in process `syz.1.8148'. [ 1008.110086][ T1637] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8151'. [ 1008.158805][ T28] kauditd_printk_skb: 96 callbacks suppressed [ 1008.158821][ T28] audit: type=1400 audit(1771437891.388:4251): avc: denied { connect } for pid=1648 comm="syz.9.8154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1008.264429][ T1656] netlink: 'syz.9.8156': attribute type 21 has an invalid length. [ 1008.293501][ T1656] netlink: 10 bytes leftover after parsing attributes in process `syz.9.8156'. [ 1008.371979][ T1657] SELinux: security_context_str_to_sid (8Ӎ CWyP A`aivaGpkjadeȴWO^ [ 1008.371979][ T1657] 8) failed with errno=-22 [ 1008.406878][ T1665] FAULT_INJECTION: forcing a failure. [ 1008.406878][ T1665] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1008.420462][ T1665] CPU: 0 UID: 0 PID: 1665 Comm: syz.9.8159 Tainted: G W syzkaller #0 PREEMPT(full) [ 1008.420495][ T1665] Tainted: [W]=WARN [ 1008.420501][ T1665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1008.420529][ T1665] Call Trace: [ 1008.420535][ T1665] [ 1008.420558][ T1665] __dump_stack+0x1d/0x30 [ 1008.420589][ T1665] dump_stack_lvl+0x95/0xd0 [ 1008.420617][ T1665] dump_stack+0x15/0x1b [ 1008.420643][ T1665] should_fail_ex+0x263/0x280 [ 1008.420687][ T1665] should_fail+0xb/0x20 [ 1008.420702][ T1665] should_fail_usercopy+0x1a/0x20 [ 1008.420770][ T1665] _copy_from_user+0x1c/0xb0 [ 1008.420793][ T1665] ___sys_recvmsg+0xaa/0x3b0 [ 1008.420839][ T1665] do_recvmmsg+0x1ef/0x560 [ 1008.420876][ T1665] ? get_timespec64+0xd2/0x100 [ 1008.420897][ T1665] __x64_sys_recvmmsg+0xfb/0x170 [ 1008.420933][ T1665] x64_sys_call+0x80f/0x3020 [ 1008.420984][ T1665] do_syscall_64+0x12c/0x370 [ 1008.421014][ T1665] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1008.421038][ T1665] RIP: 0033:0x7f061f83c629 [ 1008.421056][ T1665] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1008.421127][ T1665] RSP: 002b:00007f061e28f028 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1008.421145][ T1665] RAX: ffffffffffffffda RBX: 00007f061fab5fa0 RCX: 00007f061f83c629 [ 1008.421160][ T1665] RDX: 04000000000003b4 RSI: 00002000000037c0 RDI: 0000000000000003 [ 1008.421176][ T1665] RBP: 00007f061e28f090 R08: 0000200000003700 R09: 0000000000000000 [ 1008.421192][ T1665] R10: 0000000002040000 R11: 0000000000000246 R12: 0000000000000001 [ 1008.421287][ T1665] R13: 00007f061fab6038 R14: 00007f061fab5fa0 R15: 00007ffc7712ceb8 [ 1008.421310][ T1665] [ 1008.637679][ T28] audit: type=1400 audit(1771437891.837:4252): avc: denied { map } for pid=1662 comm="syz.5.8158" path="socket:[107731]" dev="sockfs" ino=107731 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1008.661771][ T28] audit: type=1400 audit(1771437891.837:4253): avc: denied { read } for pid=1662 comm="syz.5.8158" path="socket:[107731]" dev="sockfs" ino=107731 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1008.686167][ T28] audit: type=1400 audit(1771437891.856:4254): avc: denied { accept } for pid=1662 comm="syz.5.8158" path="socket:[107731]" dev="sockfs" ino=107731 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1008.775790][ T1676] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8163'. [ 1008.815668][ T1522] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 1008.829427][ T1522] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 1008.830649][ T1680] FAULT_INJECTION: forcing a failure. [ 1008.830649][ T1680] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1008.852277][ T1680] CPU: 1 UID: 0 PID: 1680 Comm: syz.5.8164 Tainted: G W syzkaller #0 PREEMPT(full) [ 1008.852304][ T1680] Tainted: [W]=WARN [ 1008.852310][ T1680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1008.852322][ T1680] Call Trace: [ 1008.852329][ T1680] [ 1008.852337][ T1680] __dump_stack+0x1d/0x30 [ 1008.852444][ T1680] dump_stack_lvl+0x95/0xd0 [ 1008.852467][ T1680] dump_stack+0x15/0x1b [ 1008.852491][ T1680] should_fail_ex+0x263/0x280 [ 1008.852550][ T1680] should_fail+0xb/0x20 [ 1008.852565][ T1680] should_fail_usercopy+0x1a/0x20 [ 1008.852643][ T1680] _copy_from_user+0x1c/0xb0 [ 1008.852701][ T1680] ___sys_recvmsg+0xaa/0x3b0 [ 1008.852737][ T1680] do_recvmmsg+0x1ef/0x560 [ 1008.852767][ T1680] ? get_timespec64+0xd2/0x100 [ 1008.852787][ T1680] __x64_sys_recvmmsg+0xfb/0x170 [ 1008.852841][ T1680] x64_sys_call+0x80f/0x3020 [ 1008.852867][ T1680] do_syscall_64+0x12c/0x370 [ 1008.852979][ T1680] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1008.852999][ T1680] RIP: 0033:0x7f88b2d4c629 [ 1008.853015][ T1680] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1008.853037][ T1680] RSP: 002b:00007f88b17a7028 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1008.853058][ T1680] RAX: ffffffffffffffda RBX: 00007f88b2fc5fa0 RCX: 00007f88b2d4c629 [ 1008.853071][ T1680] RDX: 04000000000003b4 RSI: 00002000000037c0 RDI: 0000000000000003 [ 1008.853127][ T1680] RBP: 00007f88b17a7090 R08: 0000200000003700 R09: 0000000000000000 [ 1008.853143][ T1680] R10: 0000000002040000 R11: 0000000000000246 R12: 0000000000000001 [ 1008.853159][ T1680] R13: 00007f88b2fc6038 R14: 00007f88b2fc5fa0 R15: 00007ffff760fec8 [ 1008.853182][ T1680] [ 1008.853558][ T1522] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 1009.080948][ T1674] syz.9.8162 (1674) used greatest stack depth: 5808 bytes left [ 1009.113075][ T1686] libceph: secret too big 289 [ 1009.113915][ T1522] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 1009.201744][ T1522] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1009.215530][ T1522] 8021q: adding VLAN 0 to HW filter on device team0 [ 1009.225886][ T3839] bridge0: port 1(bridge_slave_0) entered blocking state [ 1009.233015][ T3839] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1009.255161][ T1522] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1009.265958][ T1522] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1009.299579][ T3839] bridge0: port 2(bridge_slave_1) entered blocking state [ 1009.306786][ T3839] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1009.337903][ T1707] FAULT_INJECTION: forcing a failure. [ 1009.337903][ T1707] name failslab, interval 1, probability 0, space 0, times 0 [ 1009.422824][ T1522] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1009.430615][ T1707] CPU: 1 UID: 0 PID: 1707 Comm: syz.1.8170 Tainted: G W syzkaller #0 PREEMPT(full) [ 1009.430663][ T1707] Tainted: [W]=WARN [ 1009.430673][ T1707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1009.430735][ T1707] Call Trace: [ 1009.430742][ T1707] [ 1009.430750][ T1707] __dump_stack+0x1d/0x30 [ 1009.430829][ T1707] dump_stack_lvl+0x95/0xd0 [ 1009.430859][ T1707] dump_stack+0x15/0x1b [ 1009.430885][ T1707] should_fail_ex+0x263/0x280 [ 1009.430956][ T1707] should_failslab+0x8c/0xb0 [ 1009.431031][ T1707] kmem_cache_alloc_node_noprof+0x6d/0x460 [ 1009.431076][ T1707] ? __alloc_skb+0x2d6/0x690 [ 1009.431206][ T1707] __alloc_skb+0x2d6/0x690 [ 1009.431231][ T1707] ? __alloc_skb+0x200/0x690 [ 1009.431267][ T1707] netlink_alloc_large_skb+0xbf/0xf0 [ 1009.431293][ T1707] netlink_sendmsg+0x40c/0x6f0 [ 1009.431346][ T1707] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1009.431376][ T1707] ____sys_sendmsg+0x5af/0x600 [ 1009.431512][ T1707] ___sys_sendmsg+0x195/0x1e0 [ 1009.431558][ T1707] __x64_sys_sendmsg+0xd4/0x160 [ 1009.431585][ T1707] x64_sys_call+0x194c/0x3020 [ 1009.431652][ T1707] do_syscall_64+0x12c/0x370 [ 1009.431691][ T1707] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1009.431777][ T1707] RIP: 0033:0x7f652793c629 [ 1009.431796][ T1707] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1009.431848][ T1707] RSP: 002b:00007f6526355028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1009.431866][ T1707] RAX: ffffffffffffffda RBX: 00007f6527bb6180 RCX: 00007f652793c629 [ 1009.431878][ T1707] RDX: 0000000004000080 RSI: 0000200000000300 RDI: 0000000000000008 [ 1009.431895][ T1707] RBP: 00007f6526355090 R08: 0000000000000000 R09: 0000000000000000 [ 1009.431911][ T1707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1009.431926][ T1707] R13: 00007f6527bb6218 R14: 00007f6527bb6180 R15: 00007ffe58f72ff8 [ 1009.431990][ T1707] [ 1009.855893][ T1522] veth0_vlan: entered promiscuous mode [ 1009.866747][ T1522] veth1_vlan: entered promiscuous mode [ 1009.900865][ T1522] veth0_macvtap: entered promiscuous mode [ 1009.929014][ T1522] veth1_macvtap: entered promiscuous mode [ 1009.951266][ T1522] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1009.963012][ T1522] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1009.984502][ T3839] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1010.002224][ T3839] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1010.012364][ T3839] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1010.037719][ T3839] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1010.116248][ T1739] FAULT_INJECTION: forcing a failure. [ 1010.116248][ T1739] name failslab, interval 1, probability 0, space 0, times 0 [ 1010.162561][ T1739] CPU: 0 UID: 0 PID: 1739 Comm: syz.8.8133 Tainted: G W syzkaller #0 PREEMPT(full) [ 1010.162612][ T1739] Tainted: [W]=WARN [ 1010.162621][ T1739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1010.162633][ T1739] Call Trace: [ 1010.162650][ T1739] [ 1010.162658][ T1739] __dump_stack+0x1d/0x30 [ 1010.162691][ T1739] dump_stack_lvl+0x95/0xd0 [ 1010.162782][ T1739] dump_stack+0x15/0x1b [ 1010.162810][ T1739] should_fail_ex+0x263/0x280 [ 1010.162892][ T1739] should_failslab+0x8c/0xb0 [ 1010.162921][ T1739] __kmalloc_noprof+0xb8/0x4e0 [ 1010.162943][ T1739] ? do_handle_open+0x3a9/0x790 [ 1010.162972][ T1739] do_handle_open+0x3a9/0x790 [ 1010.162999][ T1739] __x64_sys_open_by_handle_at+0x44/0x50 [ 1010.163106][ T1739] x64_sys_call+0x153d/0x3020 [ 1010.163134][ T1739] do_syscall_64+0x12c/0x370 [ 1010.163309][ T1739] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1010.163336][ T1739] RIP: 0033:0x7fe68564c629 [ 1010.163355][ T1739] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1010.163372][ T1739] RSP: 002b:00007fe6840a7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 1010.163433][ T1739] RAX: ffffffffffffffda RBX: 00007fe6858c5fa0 RCX: 00007fe68564c629 [ 1010.163503][ T1739] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000005 [ 1010.163515][ T1739] RBP: 00007fe6840a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1010.163530][ T1739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1010.163545][ T1739] R13: 00007fe6858c6038 R14: 00007fe6858c5fa0 R15: 00007ffecfbffd68 [ 1010.163569][ T1739] [ 1010.734604][ T1754] FAULT_INJECTION: forcing a failure. [ 1010.734604][ T1754] name failslab, interval 1, probability 0, space 0, times 0 [ 1010.747641][ T1752] FAULT_INJECTION: forcing a failure. [ 1010.747641][ T1752] name failslab, interval 1, probability 0, space 0, times 0 [ 1010.767477][ T1752] CPU: 0 UID: 0 PID: 1752 Comm: syz.8.8181 Tainted: G W syzkaller #0 PREEMPT(full) [ 1010.767512][ T1752] Tainted: [W]=WARN [ 1010.767519][ T1752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1010.767542][ T1752] Call Trace: [ 1010.767548][ T1752] [ 1010.767555][ T1752] __dump_stack+0x1d/0x30 [ 1010.767588][ T1752] dump_stack_lvl+0x95/0xd0 [ 1010.767619][ T1752] dump_stack+0x15/0x1b [ 1010.767712][ T1752] should_fail_ex+0x263/0x280 [ 1010.767755][ T1752] should_failslab+0x8c/0xb0 [ 1010.767786][ T1752] kmem_cache_alloc_node_noprof+0x6d/0x460 [ 1010.767862][ T1752] ? __alloc_skb+0x2d6/0x690 [ 1010.767889][ T1752] __alloc_skb+0x2d6/0x690 [ 1010.767934][ T1752] ? __alloc_skb+0x200/0x690 [ 1010.767956][ T1752] netlbl_cipsov4_list+0x63/0xb50 [ 1010.767981][ T1752] ? __nla_parse+0x40/0x60 [ 1010.768026][ T1752] ? genl_family_rcv_msg_attrs_parse+0x13b/0x190 [ 1010.768069][ T1752] ? genl_family_rcv_msg_attrs_parse+0x184/0x190 [ 1010.768141][ T1752] genl_family_rcv_msg_doit+0x187/0x1f0 [ 1010.768183][ T1752] genl_rcv_msg+0x432/0x470 [ 1010.768266][ T1752] ? __pfx_netlbl_cipsov4_list+0x10/0x10 [ 1010.768293][ T1752] netlink_rcv_skb+0x123/0x220 [ 1010.768342][ T1752] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1010.768374][ T1752] genl_rcv+0x28/0x40 [ 1010.768429][ T1752] netlink_unicast+0x5c0/0x690 [ 1010.768456][ T1752] netlink_sendmsg+0x5c8/0x6f0 [ 1010.768543][ T1752] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1010.768566][ T1752] ____sys_sendmsg+0x5af/0x600 [ 1010.768593][ T1752] ___sys_sendmsg+0x195/0x1e0 [ 1010.768635][ T1752] __x64_sys_sendmsg+0xd4/0x160 [ 1010.768666][ T1752] x64_sys_call+0x194c/0x3020 [ 1010.768759][ T1752] do_syscall_64+0x12c/0x370 [ 1010.768789][ T1752] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1010.768813][ T1752] RIP: 0033:0x7fe68564c629 [ 1010.768827][ T1752] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1010.768848][ T1752] RSP: 002b:00007fe6840a7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1010.768871][ T1752] RAX: ffffffffffffffda RBX: 00007fe6858c5fa0 RCX: 00007fe68564c629 [ 1010.768885][ T1752] RDX: 0000000000004010 RSI: 0000200000000900 RDI: 0000000000000004 [ 1010.768898][ T1752] RBP: 00007fe6840a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1010.768910][ T1752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1010.768922][ T1752] R13: 00007fe6858c6038 R14: 00007fe6858c5fa0 R15: 00007ffecfbffd68 [ 1010.768940][ T1752] [ 1010.769038][ T1754] CPU: 0 UID: 0 PID: 1754 Comm: syz.1.8180 Tainted: G W syzkaller #0 PREEMPT(full) [ 1010.769070][ T1754] Tainted: [W]=WARN [ 1010.769078][ T1754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1010.769092][ T1754] Call Trace: [ 1010.769098][ T1754] [ 1010.769105][ T1754] __dump_stack+0x1d/0x30 [ 1010.769142][ T1754] dump_stack_lvl+0x95/0xd0 [ 1010.769198][ T1754] dump_stack+0x15/0x1b [ 1010.769221][ T1754] should_fail_ex+0x263/0x280 [ 1010.769328][ T1754] should_failslab+0x8c/0xb0 [ 1010.769374][ T1754] __kmalloc_noprof+0xb8/0x4e0 [ 1010.769392][ T1754] ? security_msg_msg_alloc+0x45/0x100 [ 1010.769454][ T1754] ? should_fail_ex+0xd9/0x280 [ 1010.769488][ T1754] security_msg_msg_alloc+0x45/0x100 [ 1010.769518][ T1754] load_msg+0x222/0x2f0 [ 1010.769549][ T1754] do_msgsnd+0xe8/0xba0 [ 1010.769579][ T1754] ? __rcu_read_unlock+0x4e/0x70 [ 1010.769600][ T1754] ? __fget_files+0x184/0x1c0 [ 1010.769622][ T1754] ? mutex_lock+0x57/0x90 [ 1010.769767][ T1754] ? mutex_unlock+0x4e/0x90 [ 1010.769789][ T1754] ? fput+0x8f/0xc0 [ 1010.769811][ T1754] __x64_sys_msgsnd+0xa8/0xc0 [ 1010.769842][ T1754] x64_sys_call+0x15e7/0x3020 [ 1010.769900][ T1754] do_syscall_64+0x12c/0x370 [ 1010.769930][ T1754] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1010.769951][ T1754] RIP: 0033:0x7f652793c629 [ 1010.769965][ T1754] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1010.770028][ T1754] RSP: 002b:00007f6526397028 EFLAGS: 00000246 ORIG_RAX: 0000000000000045 [ 1010.770106][ T1754] RAX: ffffffffffffffda RBX: 00007f6527bb5fa0 RCX: 00007f652793c629 [ 1010.770119][ T1754] RDX: 0000000000000008 RSI: 0000200000000240 RDI: 0000000000000000 [ 1010.770131][ T1754] RBP: 00007f6526397090 R08: 0000000000000000 R09: 0000000000000000 [ 1010.770153][ T1754] R10: 8fa2496c381b7ad5 R11: 0000000000000246 R12: 0000000000000001 [ 1010.770206][ T1754] R13: 00007f6527bb6038 R14: 00007f6527bb5fa0 R15: 00007ffe58f72ff8 [ 1010.770224][ T1754] [ 1011.274497][ T1757] vhci_hcd vhci_hcd.0: pdev(9) rhport(0) sockfd(4) [ 1011.281058][ T1757] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1011.308895][ T1757] vhci_hcd vhci_hcd.0: Device attached [ 1011.445788][ T28] audit: type=1400 audit(1771437894.457:4255): avc: denied { bind } for pid=1768 comm="syz.8.8186" lport=60129 faddr=::ffff:100.1.1.0 fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 1011.473452][ T28] audit: type=1400 audit(1771437894.457:4256): avc: denied { name_bind } for pid=1768 comm="syz.8.8186" src=20002 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1011.625074][T24349] usb 19-1: new low-speed USB device number 5 using vhci_hcd [ 1011.794617][ T28] audit: type=1400 audit(1771437894.457:4257): avc: denied { node_bind } for pid=1768 comm="syz.8.8186" saddr=fe80::aa src=20002 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 1011.921222][ T1778] __nla_validate_parse: 7 callbacks suppressed [ 1011.921237][ T1778] netlink: 8 bytes leftover after parsing attributes in process `syz.8.8188'. [ 1011.975961][ T28] audit: type=1326 audit(1771437894.962:4258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1777 comm="syz.8.8188" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe68564c629 code=0x7ffc0000 [ 1012.009372][ T1778] netlink: 12 bytes leftover after parsing attributes in process `syz.8.8188'. [ 1012.018615][ T1778] netlink: 48 bytes leftover after parsing attributes in process `syz.8.8188'. [ 1012.027829][ T28] audit: type=1326 audit(1771437894.990:4259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1777 comm="syz.8.8188" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe68564c629 code=0x7ffc0000 [ 1012.081706][ T28] audit: type=1326 audit(1771437894.990:4260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1777 comm="syz.8.8188" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe68564c629 code=0x7ffc0000 [ 1012.116490][ T1745] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8177'. [ 1012.127240][ T1778] netlink: 8 bytes leftover after parsing attributes in process `syz.8.8188'. [ 1012.153907][ T1760] vhci_hcd: connection reset by peer [ 1012.167179][ T3839] vhci_hcd vhci_hcd.9: stop threads [ 1012.174075][ T3839] vhci_hcd vhci_hcd.9: release socket [ 1012.184839][ T3839] vhci_hcd vhci_hcd.9: disconnect device [ 1012.323468][ T1790] FAULT_INJECTION: forcing a failure. [ 1012.323468][ T1790] name failslab, interval 1, probability 0, space 0, times 0 [ 1012.343490][ T1790] CPU: 0 UID: 0 PID: 1790 Comm: syz.5.8194 Tainted: G W syzkaller #0 PREEMPT(full) [ 1012.343525][ T1790] Tainted: [W]=WARN [ 1012.343533][ T1790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1012.343550][ T1790] Call Trace: [ 1012.343558][ T1790] [ 1012.343567][ T1790] __dump_stack+0x1d/0x30 [ 1012.343610][ T1790] dump_stack_lvl+0x95/0xd0 [ 1012.343638][ T1790] dump_stack+0x15/0x1b [ 1012.343664][ T1790] should_fail_ex+0x263/0x280 [ 1012.343703][ T1790] should_failslab+0x8c/0xb0 [ 1012.343815][ T1790] __kmalloc_noprof+0xb8/0x4e0 [ 1012.343839][ T1790] ? security_bpf_map_create+0x51/0x130 [ 1012.343879][ T1790] security_bpf_map_create+0x51/0x130 [ 1012.343984][ T1790] map_create+0xcb5/0xda0 [ 1012.344006][ T1790] ? security_bpf+0x2b/0x90 [ 1012.344050][ T1790] __sys_bpf+0x5c8/0x7e0 [ 1012.344081][ T1790] __x64_sys_bpf+0x41/0x50 [ 1012.344191][ T1790] x64_sys_call+0x10cb/0x3020 [ 1012.344220][ T1790] do_syscall_64+0x12c/0x370 [ 1012.344252][ T1790] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1012.344274][ T1790] RIP: 0033:0x7f88b2d4c629 [ 1012.344288][ T1790] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1012.344374][ T1790] RSP: 002b:00007f88b17a7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1012.344397][ T1790] RAX: ffffffffffffffda RBX: 00007f88b2fc5fa0 RCX: 00007f88b2d4c629 [ 1012.344414][ T1790] RDX: 0000000000000050 RSI: 0000200000000000 RDI: 0000000000000000 [ 1012.344552][ T1790] RBP: 00007f88b17a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1012.344566][ T1790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1012.344588][ T1790] R13: 00007f88b2fc6038 R14: 00007f88b2fc5fa0 R15: 00007ffff760fec8 [ 1012.344606][ T1790] [ 1014.225233][ T28] kauditd_printk_skb: 57 callbacks suppressed [ 1014.225253][ T28] audit: type=1400 audit(1771437897.066:4318): avc: denied { setopt } for pid=1829 comm="syz.8.8208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 1014.270581][ T1841] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 1014.277233][ T1841] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1014.296403][ T1841] vhci_hcd vhci_hcd.0: Device attached [ 1014.517787][ T28] audit: type=1400 audit(1771437897.338:4319): avc: denied { sqpoll } for pid=1854 comm="syz.9.8215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1014.545723][T24342] usb 11-1: new low-speed USB device number 11 using vhci_hcd [ 1014.595749][ T28] audit: type=1400 audit(1771437897.412:4320): avc: denied { setopt } for pid=1854 comm="syz.9.8215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1014.621539][ T1855] ieee802154 phy1 wpan1: encryption failed: -22 [ 1014.683181][ T1858] can0: slcan on ttyS3. [ 1014.716927][ T1858] can0 (unregistered): slcan off ttyS3. [ 1014.743269][ T1858] can0: slcan on ttyS3. [ 1014.855753][ T1858] can0 (unregistered): slcan off ttyS3. [ 1014.879556][ T1875] veth0_to_hsr: Caught tx_queue_len zero misconfig [ 1014.888212][ T1867] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1014.900331][ T1867] batadv_slave_0: entered promiscuous mode [ 1015.111447][ T1845] vhci_hcd: connection reset by peer [ 1015.117086][ T4047] vhci_hcd vhci_hcd.5: stop threads [ 1015.122412][ T4047] vhci_hcd vhci_hcd.5: release socket [ 1015.131782][ T4047] vhci_hcd vhci_hcd.5: disconnect device [ 1015.637732][ T1928] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1015.646292][ T1928] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1015.937658][ T1932] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8231'. [ 1016.154889][ T1939] SELinux: security_context_str_to_sid () failed with errno=-22 [ 1016.632786][ T1962] xt_hashlimit: size too large, truncated to 1048576 [ 1016.939637][ T1972] vhci_hcd vhci_hcd.0: pdev(9) rhport(0) sockfd(4) [ 1016.946225][ T1972] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1016.975863][ T1972] vhci_hcd vhci_hcd.0: Device attached [ 1017.452988][ T1990] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8248'. [ 1017.639326][ T28] audit: type=1400 audit(1771437900.256:4321): avc: denied { ioctl } for pid=1995 comm="syz.3.8251" path="socket:[107418]" dev="sockfs" ino=107418 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 1017.827265][ T1973] vhci_hcd: connection reset by peer [ 1017.849127][ T3839] vhci_hcd vhci_hcd.9: stop threads [ 1017.854792][ T3839] vhci_hcd vhci_hcd.9: release socket [ 1017.862293][ T3839] vhci_hcd vhci_hcd.9: disconnect device [ 1017.873789][T24349] usb 19-1: enqueue for inactive port 0 [ 1017.879491][T24349] usb 19-1: enqueue for inactive port 0 [ 1017.955973][T24349] vhci_hcd vhci_hcd.9: vhci_device speed not set [ 1018.514399][ T2018] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8259'. [ 1018.584337][ T28] audit: type=1400 audit(1771437901.135:4322): avc: denied { accept } for pid=2021 comm="syz.8.8261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1018.715871][ T2012] program syz.9.8256 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1018.720558][ T28] audit: type=1400 audit(1771437901.266:4323): avc: denied { mount } for pid=2028 comm="syz.8.8263" name="/" dev="hugetlbfs" ino=107494 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1018.741338][ T2029] sg_write: data in/out 915/758 bytes for SCSI command 0x0-- guessing data in; [ 1018.741338][ T2029] program syz.8.8263 not setting count and/or reply_len properly [ 1019.108749][ T2053] netlink: 16 bytes leftover after parsing attributes in process `syz.3.8273'. [ 1019.196394][ T2058] FAULT_INJECTION: forcing a failure. [ 1019.196394][ T2058] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1019.229292][ T2059] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1019.238098][ T2059] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1019.263319][ T2058] CPU: 1 UID: 0 PID: 2058 Comm: syz.3.8275 Tainted: G W syzkaller #0 PREEMPT(full) [ 1019.263402][ T2058] Tainted: [W]=WARN [ 1019.263412][ T2058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1019.263474][ T2058] Call Trace: [ 1019.263481][ T2058] [ 1019.263489][ T2058] __dump_stack+0x1d/0x30 [ 1019.263515][ T2058] dump_stack_lvl+0x95/0xd0 [ 1019.263602][ T2058] dump_stack+0x15/0x1b [ 1019.263630][ T2058] should_fail_ex+0x263/0x280 [ 1019.263726][ T2058] should_fail_alloc_page+0xf2/0x100 [ 1019.263766][ T2058] __alloc_frozen_pages_noprof+0x108/0x360 [ 1019.263801][ T2058] alloc_pages_mpol+0xb3/0x260 [ 1019.263913][ T2058] vma_alloc_folio_noprof+0x1a9/0x300 [ 1019.263946][ T2058] do_wp_page+0xf62/0x2590 [ 1019.263973][ T2058] ? css_rstat_updated+0xbb/0x280 [ 1019.264035][ T2058] ? __rcu_read_lock+0x36/0x50 [ 1019.264063][ T2058] handle_mm_fault+0x8c7/0x3020 [ 1019.264094][ T2058] ? vma_start_read+0x1c7/0x2c0 [ 1019.264169][ T2058] do_user_addr_fault+0x62f/0x1050 [ 1019.264203][ T2058] ? fpregs_assert_state_consistent+0xb3/0xe0 [ 1019.264314][ T2058] ? arch_exit_to_user_mode_prepare+0x26/0x80 [ 1019.264384][ T2058] ? trace_page_fault_user+0x1f/0xe0 [ 1019.264420][ T2058] exc_page_fault+0x62/0xa0 [ 1019.264520][ T2058] asm_exc_page_fault+0x26/0x30 [ 1019.264541][ T2058] RIP: 0033:0x7f1179963a63 [ 1019.264559][ T2058] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 1019.264577][ T2058] RSP: 002b:00007f11784fe470 EFLAGS: 00010206 [ 1019.264601][ T2058] RAX: 0000000000008200 RBX: 00007f11784fe530 RCX: 00007f11700df000 [ 1019.264614][ T2058] RDX: 00007f11784fe6d0 RSI: 0000000000000037 RDI: 00007f11784fe5d0 [ 1019.264681][ T2058] RBP: 0000000000000082 R08: 0000000000000009 R09: 00000000000001c4 [ 1019.264716][ T2058] R10: 00000000000001ce R11: 00007f11784fe530 R12: 0000000000000001 [ 1019.264729][ T2058] R13: 00007f1179b62200 R14: 0000000000000053 R15: 00007f11784fe5d0 [ 1019.264748][ T2058] [ 1019.264855][ T2058] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 1019.501019][ T2063] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8272'. [ 1019.627474][ T2064] SELinux: security_context_str_to_sid () failed with errno=-22 [ 1019.763008][ T2069] netlink: 36 bytes leftover after parsing attributes in process `syz.1.8276'. [ 1019.812788][ T2071] netlink: 20 bytes leftover after parsing attributes in process `syz.9.8279'. [ 1019.827094][ T2071] netlink: 20 bytes leftover after parsing attributes in process `syz.9.8279'. [ 1019.877492][ T28] audit: type=1400 audit(1771437902.351:4324): avc: denied { setopt } for pid=2078 comm="syz.9.8282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 1019.899993][ T2084] netlink: 8 bytes leftover after parsing attributes in process `syz.8.8283'. [ 1019.933004][ T2081] netlink: 24 bytes leftover after parsing attributes in process `syz.3.8281'. [ 1019.952052][ T28] audit: type=1400 audit(1771437902.417:4325): avc: denied { create } for pid=2088 comm="syz.8.8285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 1019.980665][T24342] usb 11-1: enqueue for inactive port 0 [ 1019.997515][T24342] usb 11-1: enqueue for inactive port 0 [ 1020.072901][T24342] vhci_hcd vhci_hcd.5: vhci_device speed not set [ 1020.099470][ T28] audit: type=1400 audit(1771437902.557:4326): avc: denied { getattr } for pid=2096 comm="syz.8.8288" path=2F7365637265746D656D202864656C6574656429 dev="secretmem" ino=109677 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1020.131191][ T28] audit: type=1400 audit(1771437902.557:4327): avc: denied { connect } for pid=2096 comm="syz.8.8288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1020.573315][ T28] audit: type=1400 audit(1771437902.997:4328): avc: denied { mount } for pid=2110 comm="syz.3.8292" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1020.679554][ T28] audit: type=1326 audit(1771437903.100:4329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2108 comm="syz.9.8291" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f061f83c629 code=0x7ffc0000 [ 1020.725263][ T28] audit: type=1326 audit(1771437903.100:4330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2108 comm="syz.9.8291" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f061f83c629 code=0x7ffc0000 [ 1020.759901][ T28] audit: type=1326 audit(1771437903.100:4331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2108 comm="syz.9.8291" exe="/root/syz-executor" sig=0 arch=c000003e syscall=91 compat=0 ip=0x7f061f83c629 code=0x7ffc0000 [ 1020.763928][ T2119] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1020.792970][ T28] audit: type=1326 audit(1771437903.100:4332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2108 comm="syz.9.8291" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f061f83c629 code=0x7ffc0000 [ 1020.814839][ T2119] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1020.822012][ T28] audit: type=1326 audit(1771437903.100:4333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2108 comm="syz.9.8291" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f061f83c629 code=0x7ffc0000 [ 1020.965580][ T2130] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8299'. [ 1021.452134][ T2159] 9pnet_fd: Insufficient options for proto=fd [ 1022.692899][ T2183] SELinux: security_context_str_to_sid (8Ӎ CWyP A`aivaGpkjadeȴWO^ [ 1022.692899][ T2183] 8) failed with errno=-22 [ 1022.760004][ T2198] lo speed is unknown, defaulting to 1000 [ 1022.775886][ T2198] lo speed is unknown, defaulting to 1000 [ 1022.796019][ T2202] 9pnet_fd: Insufficient options for proto=fd [ 1022.806003][ T2198] lo speed is unknown, defaulting to 1000 [ 1022.815864][ T2198] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 1022.826491][ T2204] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 1022.833050][ T2204] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1022.849244][ T2204] vhci_hcd vhci_hcd.0: Device attached [ 1022.855867][ T2198] lo speed is unknown, defaulting to 1000 [ 1022.869564][ T2198] lo speed is unknown, defaulting to 1000 [ 1022.875939][ T2198] lo speed is unknown, defaulting to 1000 [ 1022.882159][ T2198] lo speed is unknown, defaulting to 1000 [ 1022.893923][ T2198] lo speed is unknown, defaulting to 1000 [ 1022.900196][ T2198] lo speed is unknown, defaulting to 1000 [ 1022.906541][ T2198] lo speed is unknown, defaulting to 1000 [ 1022.912941][ T2198] lo speed is unknown, defaulting to 1000 [ 1022.983832][ T2211] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(4) [ 1022.990468][ T2211] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1022.998208][ T2211] vhci_hcd vhci_hcd.0: Device attached [ 1023.098260][T24355] usb 11-1: new low-speed USB device number 12 using vhci_hcd [ 1023.445734][ T2224] __nla_validate_parse: 10 callbacks suppressed [ 1023.445751][ T2224] netlink: 4268 bytes leftover after parsing attributes in process `syz.9.8330'. [ 1023.462092][ T2224] netlink: 4268 bytes leftover after parsing attributes in process `syz.9.8330'. [ 1023.518567][ T2229] netlink: 104 bytes leftover after parsing attributes in process `syz.9.8332'. [ 1023.714851][ T2206] vhci_hcd: connection reset by peer [ 1023.721802][ T3844] vhci_hcd vhci_hcd.5: stop threads [ 1023.727968][ T3844] vhci_hcd vhci_hcd.5: release socket [ 1023.737353][ T3844] vhci_hcd vhci_hcd.5: disconnect device [ 1023.769701][ T2231] lo speed is unknown, defaulting to 1000 [ 1023.878947][ T2212] vhci_hcd: connection closed [ 1023.879276][ T3837] vhci_hcd vhci_hcd.3: stop threads [ 1023.889766][ T3837] vhci_hcd vhci_hcd.3: release socket [ 1023.895638][ T3837] vhci_hcd vhci_hcd.3: disconnect device [ 1023.928586][ T2234] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8334'. [ 1023.981720][ T2234] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8334'. [ 1024.038310][ T2234] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8334'. [ 1024.115218][ T2236] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8335'. [ 1024.500365][ T2248] SELinux: security_context_str_to_sid (8Ӎ CWyP A`aivaGpkjadeȴWO^ [ 1024.500365][ T2248] 8) failed with errno=-22 [ 1024.537409][ T2256] netlink: 14 bytes leftover after parsing attributes in process `syz.3.8341'. [ 1024.574629][ T2258] 9pnet_fd: Insufficient options for proto=fd [ 1024.597980][ T2256] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1024.640719][ T2256] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1024.651884][ T2256] bond0 (unregistering): Released all slaves [ 1024.715694][ T2262] FAULT_INJECTION: forcing a failure. [ 1024.715694][ T2262] name failslab, interval 1, probability 0, space 0, times 0 [ 1024.728600][ T2262] CPU: 0 UID: 0 PID: 2262 Comm: syz.9.8339 Tainted: G W syzkaller #0 PREEMPT(full) [ 1024.728702][ T2262] Tainted: [W]=WARN [ 1024.728709][ T2262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1024.728721][ T2262] Call Trace: [ 1024.728728][ T2262] [ 1024.728759][ T2262] __dump_stack+0x1d/0x30 [ 1024.728785][ T2262] dump_stack_lvl+0x95/0xd0 [ 1024.728878][ T2262] dump_stack+0x15/0x1b [ 1024.728906][ T2262] should_fail_ex+0x263/0x280 [ 1024.729019][ T2262] should_failslab+0x8c/0xb0 [ 1024.729061][ T2262] __kvmalloc_node_noprof+0x155/0x650 [ 1024.729090][ T2262] ? map_get_next_key+0x19c/0x330 [ 1024.729162][ T2262] map_get_next_key+0x19c/0x330 [ 1024.729186][ T2262] ? __sys_bpf+0x643/0x7e0 [ 1024.729235][ T2262] __sys_bpf+0x64d/0x7e0 [ 1024.729357][ T2262] __x64_sys_bpf+0x41/0x50 [ 1024.729460][ T2262] x64_sys_call+0x10cb/0x3020 [ 1024.729513][ T2262] do_syscall_64+0x12c/0x370 [ 1024.729548][ T2262] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1024.729611][ T2262] RIP: 0033:0x7f061f83c629 [ 1024.729648][ T2262] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1024.729748][ T2262] RSP: 002b:00007f061e28f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1024.729767][ T2262] RAX: ffffffffffffffda RBX: 00007f061fab5fa0 RCX: 00007f061f83c629 [ 1024.729781][ T2262] RDX: 0000000000000020 RSI: 0000200000000540 RDI: 0000000000000004 [ 1024.729793][ T2262] RBP: 00007f061e28f090 R08: 0000000000000000 R09: 0000000000000000 [ 1024.729806][ T2262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1024.729848][ T2262] R13: 00007f061fab6038 R14: 00007f061fab5fa0 R15: 00007ffc7712ceb8 [ 1024.729873][ T2262] [ 1024.967082][ T2266] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8345'. [ 1024.991985][ T2266] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8345'. [ 1025.103835][ T2271] block device autoloading is deprecated and will be removed. [ 1025.289225][ T28] kauditd_printk_skb: 273 callbacks suppressed [ 1025.289239][ T28] audit: type=1400 audit(1771437907.412:4607): avc: denied { unlink } for pid=32394 comm="syz-executor" name="file0" dev="tmpfs" ino=499 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1025.538289][ T2279] lo speed is unknown, defaulting to 1000 [ 1025.626104][ T28] audit: type=1400 audit(1771437907.730:4608): avc: denied { write } for pid=2283 comm="syz.8.8352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1025.657837][ T28] audit: type=1400 audit(1771437907.749:4609): avc: denied { ioctl } for pid=2283 comm="syz.8.8352" path="socket:[110087]" dev="sockfs" ino=110087 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1025.815927][ T28] audit: type=1326 audit(1771437907.908:4610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2302 comm="syz.3.8360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1025.933435][ T28] audit: type=1326 audit(1771437907.908:4611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2302 comm="syz.3.8360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1025.972047][ T28] audit: type=1326 audit(1771437907.908:4612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2302 comm="syz.3.8360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1025.996619][ T28] audit: type=1326 audit(1771437907.908:4613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2302 comm="syz.3.8360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1026.029375][ T28] audit: type=1326 audit(1771437907.908:4614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2302 comm="syz.3.8360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1026.053358][ T28] audit: type=1326 audit(1771437907.908:4615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2302 comm="syz.3.8360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1026.077038][ T28] audit: type=1326 audit(1771437907.908:4616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2302 comm="syz.3.8360" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1026.230778][ T2314] netlink: 'syz.8.8363': attribute type 5 has an invalid length. [ 1026.250775][ T2314] netlink: 'syz.8.8363': attribute type 5 has an invalid length. [ 1026.250777][ T3837] netdevsim netdevsim8 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1026.289433][ T3837] netdevsim netdevsim8 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1026.309177][ T3837] netdevsim netdevsim8 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1026.348476][ T2306] lo speed is unknown, defaulting to 1000 [ 1026.363732][ T3837] netdevsim netdevsim8 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1026.460611][ T2321] SELinux: security_context_str_to_sid (8Ӎ CWyP A`aivaGpkjadeȴWO^ [ 1026.460611][ T2321] 8) failed with errno=-22 [ 1027.230883][ T2366] FAULT_INJECTION: forcing a failure. [ 1027.230883][ T2366] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1027.278209][ T2366] CPU: 1 UID: 0 PID: 2366 Comm: syz.1.8384 Tainted: G W syzkaller #0 PREEMPT(full) [ 1027.278266][ T2366] Tainted: [W]=WARN [ 1027.278276][ T2366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1027.278293][ T2366] Call Trace: [ 1027.278302][ T2366] [ 1027.278311][ T2366] __dump_stack+0x1d/0x30 [ 1027.278345][ T2366] dump_stack_lvl+0x95/0xd0 [ 1027.278448][ T2366] dump_stack+0x15/0x1b [ 1027.278476][ T2366] should_fail_ex+0x263/0x280 [ 1027.278521][ T2366] should_fail+0xb/0x20 [ 1027.278542][ T2366] should_fail_usercopy+0x1a/0x20 [ 1027.278615][ T2366] _copy_to_user+0x20/0xa0 [ 1027.278644][ T2366] simple_read_from_buffer+0xb5/0x130 [ 1027.278748][ T2366] proc_fail_nth_read+0x10e/0x150 [ 1027.278774][ T2366] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1027.278805][ T2366] vfs_read+0x1ab/0x7f0 [ 1027.278882][ T2366] ? __rcu_read_unlock+0x4e/0x70 [ 1027.278925][ T2366] ? __fget_files+0x184/0x1c0 [ 1027.278950][ T2366] ? mutex_lock+0x57/0x90 [ 1027.278975][ T2366] ksys_read+0xdc/0x1a0 [ 1027.279079][ T2366] __x64_sys_read+0x40/0x50 [ 1027.279117][ T2366] x64_sys_call+0x2886/0x3020 [ 1027.279164][ T2366] do_syscall_64+0x12c/0x370 [ 1027.279284][ T2366] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1027.279331][ T2366] RIP: 0033:0x7f65278fcece [ 1027.279352][ T2366] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1027.279377][ T2366] RSP: 002b:00007f6526396fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1027.279475][ T2366] RAX: ffffffffffffffda RBX: 00007f65263976c0 RCX: 00007f65278fcece [ 1027.279492][ T2366] RDX: 000000000000000f RSI: 00007f65263970a0 RDI: 0000000000000004 [ 1027.279508][ T2366] RBP: 00007f6526397090 R08: 0000000000000000 R09: 0000000000000000 [ 1027.279522][ T2366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1027.279534][ T2366] R13: 00007f6527bb6038 R14: 00007f6527bb5fa0 R15: 00007ffe58f72ff8 [ 1027.279600][ T2366] [ 1027.674937][ T2382] ieee802154 phy1 wpan1: encryption failed: -22 [ 1027.686473][ T2391] FAULT_INJECTION: forcing a failure. [ 1027.686473][ T2391] name failslab, interval 1, probability 0, space 0, times 0 [ 1027.699624][ T2391] CPU: 1 UID: 0 PID: 2391 Comm: syz.8.8394 Tainted: G W syzkaller #0 PREEMPT(full) [ 1027.699658][ T2391] Tainted: [W]=WARN [ 1027.699665][ T2391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1027.699751][ T2391] Call Trace: [ 1027.699759][ T2391] [ 1027.699768][ T2391] __dump_stack+0x1d/0x30 [ 1027.699803][ T2391] dump_stack_lvl+0x95/0xd0 [ 1027.699834][ T2391] dump_stack+0x15/0x1b [ 1027.699864][ T2391] should_fail_ex+0x263/0x280 [ 1027.699924][ T2391] should_failslab+0x8c/0xb0 [ 1027.699980][ T2391] kmem_cache_alloc_noprof+0x66/0x400 [ 1027.700071][ T2391] ? audit_log_start+0x34c/0x730 [ 1027.700261][ T2391] audit_log_start+0x34c/0x730 [ 1027.700286][ T2391] ? kstrtouint_from_user+0xa8/0xf0 [ 1027.700371][ T2391] audit_seccomp+0x47/0x100 [ 1027.700410][ T2391] ? __seccomp_filter+0x8db/0x1350 [ 1027.700476][ T2391] __seccomp_filter+0x8ec/0x1350 [ 1027.700524][ T2391] ? __rcu_read_unlock+0x4e/0x70 [ 1027.700548][ T2391] ? __fget_files+0x184/0x1c0 [ 1027.700578][ T2391] ? mutex_lock+0x57/0x90 [ 1027.700608][ T2391] ? mutex_unlock+0x4e/0x90 [ 1027.700677][ T2391] __secure_computing+0x81/0x150 [ 1027.700704][ T2391] do_syscall_64+0xd3/0x370 [ 1027.700736][ T2391] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1027.700830][ T2391] RIP: 0033:0x7fe68564c629 [ 1027.700846][ T2391] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1027.700864][ T2391] RSP: 002b:00007fe6840a7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 1027.700916][ T2391] RAX: ffffffffffffffda RBX: 00007fe6858c5fa0 RCX: 00007fe68564c629 [ 1027.700929][ T2391] RDX: 0000000000000082 RSI: 0000000000000084 RDI: 0000000000000003 [ 1027.700945][ T2391] RBP: 00007fe6840a7090 R08: 0000200000001040 R09: 0000000000000000 [ 1027.700962][ T2391] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1027.700999][ T2391] R13: 00007fe6858c6038 R14: 00007fe6858c5fa0 R15: 00007ffecfbffd68 [ 1027.701023][ T2391] [ 1027.748120][ T2393] lo speed is unknown, defaulting to 1000 [ 1027.985940][ T2401] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 1027.986432][T24349] IPVS: starting estimator thread 0... [ 1028.026076][ T2399] lo speed is unknown, defaulting to 1000 [ 1028.122839][ T2403] IPVS: using max 2400 ests per chain, 120000 per kthread [ 1028.232841][T14445] kernel read not supported for file bpf-prog (pid: 14445 comm: kworker/0:2) [ 1028.416894][ T2413] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1028.425504][ T2413] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1028.534409][T24355] usb 11-1: enqueue for inactive port 0 [ 1028.592685][T24355] usb 11-1: enqueue for inactive port 0 [ 1028.736196][T24355] vhci_hcd vhci_hcd.5: vhci_device speed not set [ 1028.990962][ T2424] ieee802154 phy1 wpan1: encryption failed: -22 [ 1029.064646][ T2436] netlink: 'syz.8.8409': attribute type 83 has an invalid length. [ 1029.151312][ T2445] __nla_validate_parse: 28 callbacks suppressed [ 1029.151326][ T2445] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8412'. [ 1029.184034][ T2443] bridge_slave_1: left allmulticast mode [ 1029.189882][ T2443] bridge_slave_1: left promiscuous mode [ 1029.207279][ T2449] FAULT_INJECTION: forcing a failure. [ 1029.207279][ T2449] name failslab, interval 1, probability 0, space 0, times 0 [ 1029.219970][ T2443] bridge0: port 2(bridge_slave_1) entered disabled state [ 1029.232940][ T2443] team0: Port device team_slave_0 removed [ 1029.241397][ T2449] CPU: 1 UID: 0 PID: 2449 Comm: syz.9.8414 Tainted: G W syzkaller #0 PREEMPT(full) [ 1029.241509][ T2449] Tainted: [W]=WARN [ 1029.241519][ T2449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1029.241665][ T2449] Call Trace: [ 1029.241673][ T2449] [ 1029.241682][ T2449] __dump_stack+0x1d/0x30 [ 1029.241773][ T2449] dump_stack_lvl+0x95/0xd0 [ 1029.241803][ T2449] dump_stack+0x15/0x1b [ 1029.241835][ T2449] should_fail_ex+0x263/0x280 [ 1029.241878][ T2449] should_failslab+0x8c/0xb0 [ 1029.241956][ T2449] __kmalloc_node_track_caller_noprof+0xc3/0x560 [ 1029.241985][ T2449] ? xfrm_add_sa+0x1af3/0x25d0 [ 1029.242023][ T2449] ? __pfx_xfrm_timer_handler+0x10/0x10 [ 1029.242070][ T2449] kmemdup_noprof+0x2b/0x70 [ 1029.242141][ T2449] xfrm_add_sa+0x1af3/0x25d0 [ 1029.242185][ T2449] xfrm_user_rcv_msg+0x576/0x670 [ 1029.242226][ T2449] ? __kfree_skb+0x109/0x150 [ 1029.242252][ T2449] ? nlmon_xmit+0x4f/0x60 [ 1029.242324][ T2449] ? consume_skb+0x4b/0x160 [ 1029.242365][ T2449] netlink_rcv_skb+0x123/0x220 [ 1029.242406][ T2449] ? __pfx_xfrm_user_rcv_msg+0x10/0x10 [ 1029.242473][ T2449] xfrm_netlink_rcv+0x48/0x60 [ 1029.242510][ T2449] netlink_unicast+0x5c0/0x690 [ 1029.242540][ T2449] netlink_sendmsg+0x5c8/0x6f0 [ 1029.242600][ T2449] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1029.242631][ T2449] ____sys_sendmsg+0x5af/0x600 [ 1029.242666][ T2449] ___sys_sendmsg+0x195/0x1e0 [ 1029.242712][ T2449] __x64_sys_sendmsg+0xd4/0x160 [ 1029.242811][ T2449] x64_sys_call+0x194c/0x3020 [ 1029.242844][ T2449] do_syscall_64+0x12c/0x370 [ 1029.242882][ T2449] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1029.242910][ T2449] RIP: 0033:0x7f061f83c629 [ 1029.242950][ T2449] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1029.242974][ T2449] RSP: 002b:00007f061e28f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1029.242999][ T2449] RAX: ffffffffffffffda RBX: 00007f061fab5fa0 RCX: 00007f061f83c629 [ 1029.243017][ T2449] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000003 [ 1029.243034][ T2449] RBP: 00007f061e28f090 R08: 0000000000000000 R09: 0000000000000000 [ 1029.243061][ T2449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1029.243076][ T2449] R13: 00007f061fab6038 R14: 00007f061fab5fa0 R15: 00007ffc7712ceb8 [ 1029.243100][ T2449] [ 1029.479837][ T2443] team0: Port device team_slave_1 removed [ 1029.486607][ T2443] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1029.507524][ T2447] 9p: Bad value for 'rfdno' [ 1029.522286][ T2443] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1029.535630][ T2443] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1029.546083][ T2443] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 1029.563296][T24321] lo speed is unknown, defaulting to 1000 [ 1029.604406][ T2455] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 1029.705773][ T2473] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8424'. [ 1029.719402][ T2469] netlink: 'syz.8.8423': attribute type 1 has an invalid length. [ 1029.784631][ T2481] geneve2: entered promiscuous mode [ 1029.792523][ T3850] netdevsim netdevsim9 netdevsim0: set [1, 1] type 2 family 0 port 20000 - 0 [ 1029.806490][ T3850] netdevsim netdevsim9 netdevsim1: set [1, 1] type 2 family 0 port 20000 - 0 [ 1029.839909][ T3850] netdevsim netdevsim9 netdevsim2: set [1, 1] type 2 family 0 port 20000 - 0 [ 1029.852380][ T2489] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8430'. [ 1029.875914][ T2491] FAULT_INJECTION: forcing a failure. [ 1029.875914][ T2491] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1029.889503][ T3850] netdevsim netdevsim9 netdevsim3: set [1, 1] type 2 family 0 port 20000 - 0 [ 1029.891301][ T2491] CPU: 1 UID: 0 PID: 2491 Comm: syz.8.8431 Tainted: G W syzkaller #0 PREEMPT(full) [ 1029.891468][ T2491] Tainted: [W]=WARN [ 1029.891490][ T2491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1029.891529][ T2491] Call Trace: [ 1029.891535][ T2491] [ 1029.891550][ T2491] __dump_stack+0x1d/0x30 [ 1029.891647][ T2491] dump_stack_lvl+0x95/0xd0 [ 1029.891718][ T2491] dump_stack+0x15/0x1b [ 1029.891848][ T2491] should_fail_ex+0x263/0x280 [ 1029.892016][ T2491] should_fail+0xb/0x20 [ 1029.892069][ T2491] should_fail_usercopy+0x1a/0x20 [ 1029.892128][ T2491] _copy_to_user+0x20/0xa0 [ 1029.892195][ T2491] simple_read_from_buffer+0xb5/0x130 [ 1029.892324][ T2491] proc_fail_nth_read+0x10e/0x150 [ 1029.892406][ T2491] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1029.892500][ T2491] vfs_read+0x1ab/0x7f0 [ 1029.892609][ T2491] ? __rcu_read_unlock+0x4e/0x70 [ 1029.892684][ T2491] ? __fget_files+0x184/0x1c0 [ 1029.892742][ T2491] ? mutex_lock+0x57/0x90 [ 1029.892848][ T2491] ksys_read+0xdc/0x1a0 [ 1029.892941][ T2491] __x64_sys_read+0x40/0x50 [ 1029.893019][ T2491] x64_sys_call+0x2886/0x3020 [ 1029.893109][ T2491] do_syscall_64+0x12c/0x370 [ 1029.893214][ T2491] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1029.893278][ T2491] RIP: 0033:0x7fe68560cece [ 1029.893325][ T2491] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1029.893407][ T2491] RSP: 002b:00007fe6840a6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1029.893464][ T2491] RAX: ffffffffffffffda RBX: 00007fe6840a76c0 RCX: 00007fe68560cece [ 1029.893535][ T2491] RDX: 000000000000000f RSI: 00007fe6840a70a0 RDI: 0000000000000004 [ 1029.893644][ T2491] RBP: 00007fe6840a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1029.893686][ T2491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1029.893720][ T2491] R13: 00007fe6858c6038 R14: 00007fe6858c5fa0 R15: 00007ffecfbffd68 [ 1029.893783][ T2491] [ 1030.076136][ T2498] netlink: 8 bytes leftover after parsing attributes in process `syz.5.8434'. [ 1030.172950][ T2506] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8437'. [ 1030.224256][ T2515] FAULT_INJECTION: forcing a failure. [ 1030.224256][ T2515] name failslab, interval 1, probability 0, space 0, times 0 [ 1030.263103][ T2515] CPU: 1 UID: 0 PID: 2515 Comm: syz.9.8442 Tainted: G W syzkaller #0 PREEMPT(full) [ 1030.263139][ T2515] Tainted: [W]=WARN [ 1030.263167][ T2515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1030.263242][ T2515] Call Trace: [ 1030.263251][ T2515] [ 1030.263260][ T2515] __dump_stack+0x1d/0x30 [ 1030.263294][ T2515] dump_stack_lvl+0x95/0xd0 [ 1030.263324][ T2515] dump_stack+0x15/0x1b [ 1030.263388][ T2515] should_fail_ex+0x263/0x280 [ 1030.263427][ T2515] should_failslab+0x8c/0xb0 [ 1030.263507][ T2515] __kmalloc_node_track_caller_noprof+0xc3/0x560 [ 1030.263538][ T2515] ? __snd_timer_user_ioctl+0x12a1/0x2bc0 [ 1030.263660][ T2515] kstrdup+0x3e/0xd0 [ 1030.263696][ T2515] __snd_timer_user_ioctl+0x12a1/0x2bc0 [ 1030.263751][ T2515] ? __pfx_snd_timer_user_ioctl+0x10/0x10 [ 1030.263815][ T2515] snd_timer_user_ioctl+0x45/0x90 [ 1030.263888][ T2515] __se_sys_ioctl+0xce/0x140 [ 1030.263926][ T2515] __x64_sys_ioctl+0x43/0x50 [ 1030.263960][ T2515] x64_sys_call+0x1563/0x3020 [ 1030.263994][ T2515] do_syscall_64+0x12c/0x370 [ 1030.264072][ T2515] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1030.264100][ T2515] RIP: 0033:0x7f061f83c629 [ 1030.264119][ T2515] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1030.264142][ T2515] RSP: 002b:00007f061e28f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1030.264165][ T2515] RAX: ffffffffffffffda RBX: 00007f061fab5fa0 RCX: 00007f061f83c629 [ 1030.264229][ T2515] RDX: 00002000000000c0 RSI: 0000000040345410 RDI: 0000000000000003 [ 1030.264246][ T2515] RBP: 00007f061e28f090 R08: 0000000000000000 R09: 0000000000000000 [ 1030.264262][ T2515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1030.264278][ T2515] R13: 00007f061fab6038 R14: 00007f061fab5fa0 R15: 00007ffc7712ceb8 [ 1030.264309][ T2515] [ 1030.480760][ T2526] SELinux: Context system_u:object_r:public_content_t:s0 is not valid (left unmapped). [ 1030.544009][ T2534] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8449'. [ 1030.570711][ T2530] lo speed is unknown, defaulting to 1000 [ 1030.577738][ T2535] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8446'. [ 1030.586772][ T2535] netlink: 'syz.9.8446': attribute type 20 has an invalid length. [ 1030.595028][ T2535] netlink: 'syz.9.8446': attribute type 21 has an invalid length. [ 1030.625457][ T2535] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8446'. [ 1030.901014][ T2554] FAULT_INJECTION: forcing a failure. [ 1030.901014][ T2554] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1030.916975][ T2554] CPU: 1 UID: 0 PID: 2554 Comm: syz.5.8456 Tainted: G W syzkaller #0 PREEMPT(full) [ 1030.917023][ T2554] Tainted: [W]=WARN [ 1030.917032][ T2554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1030.917076][ T2554] Call Trace: [ 1030.917084][ T2554] [ 1030.917093][ T2554] __dump_stack+0x1d/0x30 [ 1030.917127][ T2554] dump_stack_lvl+0x95/0xd0 [ 1030.917154][ T2554] dump_stack+0x15/0x1b [ 1030.917175][ T2554] should_fail_ex+0x263/0x280 [ 1030.917210][ T2554] should_fail+0xb/0x20 [ 1030.917297][ T2554] should_fail_usercopy+0x1a/0x20 [ 1030.917319][ T2554] _copy_to_user+0x20/0xa0 [ 1030.917376][ T2554] simple_read_from_buffer+0xb5/0x130 [ 1030.917410][ T2554] proc_fail_nth_read+0x10e/0x150 [ 1030.917439][ T2554] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1030.917520][ T2554] vfs_read+0x1ab/0x7f0 [ 1030.917556][ T2554] ? __rcu_read_unlock+0x4e/0x70 [ 1030.917581][ T2554] ? __fget_files+0x184/0x1c0 [ 1030.917608][ T2554] ? mutex_lock+0x57/0x90 [ 1030.917705][ T2554] ksys_read+0xdc/0x1a0 [ 1030.917730][ T2554] __x64_sys_read+0x40/0x50 [ 1030.917837][ T2554] x64_sys_call+0x2886/0x3020 [ 1030.917863][ T2554] do_syscall_64+0x12c/0x370 [ 1030.917891][ T2554] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1030.917911][ T2554] RIP: 0033:0x7f88b2d0cece [ 1030.917975][ T2554] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1030.918038][ T2554] RSP: 002b:00007f88b17a6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1030.918058][ T2554] RAX: ffffffffffffffda RBX: 00007f88b17a76c0 RCX: 00007f88b2d0cece [ 1030.918072][ T2554] RDX: 000000000000000f RSI: 00007f88b17a70a0 RDI: 0000000000000005 [ 1030.918083][ T2554] RBP: 00007f88b17a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1030.918093][ T2554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1030.918107][ T2554] R13: 00007f88b2fc6038 R14: 00007f88b2fc5fa0 R15: 00007ffff760fec8 [ 1030.918128][ T2554] [ 1030.940356][ T28] kauditd_printk_skb: 101 callbacks suppressed [ 1030.940402][ T28] audit: type=1400 audit(1771437912.688:4716): avc: denied { execute } for pid=2555 comm="syz.8.8457" dev="hugetlbfs" ino=110697 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 1031.079668][ T2559] netlink: 28 bytes leftover after parsing attributes in process `syz.8.8459'. [ 1031.137576][ T28] audit: type=1400 audit(1771437912.753:4717): avc: denied { execute_no_trans } for pid=2555 comm="syz.8.8457" path=2F6D656D66643A5B0BDB58AE5B1A02FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="hugetlbfs" ino=110697 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 1031.189538][ T2563] netlink: 'syz.8.8459': attribute type 1 has an invalid length. [ 1031.202907][ T2559] usb usb8: usbfs: interface 0 claimed by hub while 'syz.8.8459' sets config #0 [ 1031.606503][ T2571] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1031.615198][ T2571] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1031.906680][ T2566] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8460'. [ 1031.923312][ T2575] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1031.931933][ T2575] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1031.944075][ T2575] bridge0: port 1(bridge_slave_0) entered disabled state [ 1031.976643][ T2575] bridge_slave_0 (unregistering): left allmulticast mode [ 1031.983756][ T2575] bridge_slave_0 (unregistering): left promiscuous mode [ 1031.990768][ T2575] bridge0: port 1(bridge_slave_0) entered disabled state [ 1032.206794][ T28] audit: type=1400 audit(1771437913.829:4718): avc: denied { unlink } for pid=28147 comm="syz-executor" name=E91F7189591E9233614B dev="tmpfs" ino=2157 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:public_content_t:s0" [ 1032.269858][ T2581] FAULT_INJECTION: forcing a failure. [ 1032.269858][ T2581] name failslab, interval 1, probability 0, space 0, times 0 [ 1032.323851][ T2581] CPU: 1 UID: 0 PID: 2581 Comm: syz.9.8463 Tainted: G W syzkaller #0 PREEMPT(full) [ 1032.323940][ T2581] Tainted: [W]=WARN [ 1032.323948][ T2581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1032.323966][ T2581] Call Trace: [ 1032.323973][ T2581] [ 1032.323982][ T2581] __dump_stack+0x1d/0x30 [ 1032.324073][ T2581] dump_stack_lvl+0x95/0xd0 [ 1032.324099][ T2581] dump_stack+0x15/0x1b [ 1032.324122][ T2581] should_fail_ex+0x263/0x280 [ 1032.324161][ T2581] should_failslab+0x8c/0xb0 [ 1032.324214][ T2581] kmem_cache_alloc_noprof+0x66/0x400 [ 1032.324251][ T2581] ? alloc_empty_file+0x76/0x200 [ 1032.324278][ T2581] alloc_empty_file+0x76/0x200 [ 1032.324422][ T2581] path_openat+0x65/0x2050 [ 1032.324454][ T2581] ? __rcu_read_unlock+0x4e/0x70 [ 1032.324534][ T2581] ? __perf_event_task_sched_in+0xa65/0xad0 [ 1032.324559][ T2581] ? __perf_event_task_sched_out+0x192/0x710 [ 1032.324614][ T2581] ? _parse_integer_limit+0x170/0x190 [ 1032.324651][ T2581] do_file_open+0x16c/0x290 [ 1032.324698][ T2581] do_open_execat+0xab/0x240 [ 1032.324728][ T2581] alloc_bprm+0x25/0x350 [ 1032.324760][ T2581] do_execveat_common+0x104/0x720 [ 1032.324853][ T2581] ? do_getname+0x102/0x1c0 [ 1032.324923][ T2581] __x64_sys_execveat+0x76/0xa0 [ 1032.324955][ T2581] x64_sys_call+0x2a33/0x3020 [ 1032.324985][ T2581] do_syscall_64+0x12c/0x370 [ 1032.325021][ T2581] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1032.325117][ T2581] RIP: 0033:0x7f061f83c629 [ 1032.325135][ T2581] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1032.325159][ T2581] RSP: 002b:00007f061e28f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 1032.325259][ T2581] RAX: ffffffffffffffda RBX: 00007f061fab5fa0 RCX: 00007f061f83c629 [ 1032.325342][ T2581] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 1032.325358][ T2581] RBP: 00007f061e28f090 R08: 0000000000001000 R09: 0000000000000000 [ 1032.325373][ T2581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1032.325387][ T2581] R13: 00007f061fab6038 R14: 00007f061fab5fa0 R15: 00007ffc7712ceb8 [ 1032.325410][ T2581] [ 1032.664937][ T2587] lo speed is unknown, defaulting to 1000 [ 1032.681139][ T2585] lo speed is unknown, defaulting to 1000 [ 1032.695406][ T2591] lo speed is unknown, defaulting to 1000 [ 1032.978470][ T2600] FAULT_INJECTION: forcing a failure. [ 1032.978470][ T2600] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1032.991822][ T2600] CPU: 1 UID: 0 PID: 2600 Comm: syz.9.8470 Tainted: G W syzkaller #0 PREEMPT(full) [ 1032.991899][ T2600] Tainted: [W]=WARN [ 1032.991907][ T2600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1032.991921][ T2600] Call Trace: [ 1032.991930][ T2600] [ 1032.992016][ T2600] __dump_stack+0x1d/0x30 [ 1032.992045][ T2600] dump_stack_lvl+0x95/0xd0 [ 1032.992074][ T2600] dump_stack+0x15/0x1b [ 1032.992098][ T2600] should_fail_ex+0x263/0x280 [ 1032.992136][ T2600] should_fail+0xb/0x20 [ 1032.992197][ T2600] should_fail_usercopy+0x1a/0x20 [ 1032.992222][ T2600] _copy_to_user+0x20/0xa0 [ 1032.992263][ T2600] simple_read_from_buffer+0xb5/0x130 [ 1032.992299][ T2600] proc_fail_nth_read+0x10e/0x150 [ 1032.992457][ T2600] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1032.992503][ T2600] vfs_read+0x1ab/0x7f0 [ 1032.992602][ T2600] ? proc_resetdevice+0x15b/0x1d0 [ 1032.992630][ T2600] ? __rcu_read_unlock+0x4e/0x70 [ 1032.992653][ T2600] ? __fget_files+0x184/0x1c0 [ 1032.992678][ T2600] ? mutex_lock+0x57/0x90 [ 1032.992712][ T2600] ksys_read+0xdc/0x1a0 [ 1032.992782][ T2600] __x64_sys_read+0x40/0x50 [ 1032.992823][ T2600] x64_sys_call+0x2886/0x3020 [ 1032.992853][ T2600] do_syscall_64+0x12c/0x370 [ 1032.992946][ T2600] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1032.992970][ T2600] RIP: 0033:0x7f061f7fcece [ 1032.992987][ T2600] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1032.993013][ T2600] RSP: 002b:00007f061e28efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1032.993036][ T2600] RAX: ffffffffffffffda RBX: 00007f061e28f6c0 RCX: 00007f061f7fcece [ 1032.993052][ T2600] RDX: 000000000000000f RSI: 00007f061e28f0a0 RDI: 0000000000000004 [ 1032.993066][ T2600] RBP: 00007f061e28f090 R08: 0000000000000000 R09: 0000000000000000 [ 1032.993081][ T2600] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1032.993095][ T2600] R13: 00007f061fab6038 R14: 00007f061fab5fa0 R15: 00007ffc7712ceb8 [ 1032.993159][ T2600] [ 1033.284919][ T2606] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 1033.291496][ T2606] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1033.299163][ T2606] vhci_hcd vhci_hcd.0: Device attached [ 1033.363478][ T28] audit: type=1400 audit(1771437914.970:4719): avc: denied { getopt } for pid=2611 comm="syz.3.8475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1033.383637][ T28] audit: type=1400 audit(1771437914.970:4720): avc: denied { read } for pid=13912 comm="kworker/0:1" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=110801 scontext=system_u:system_r:kernel_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1033.438000][ T2624] FAULT_INJECTION: forcing a failure. [ 1033.438000][ T2624] name failslab, interval 1, probability 0, space 0, times 0 [ 1033.451403][ T2624] CPU: 0 UID: 0 PID: 2624 Comm: syz.3.8477 Tainted: G W syzkaller #0 PREEMPT(full) [ 1033.451445][ T2624] Tainted: [W]=WARN [ 1033.451450][ T2624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1033.451461][ T2624] Call Trace: [ 1033.451466][ T2624] [ 1033.451477][ T2624] __dump_stack+0x1d/0x30 [ 1033.451499][ T2624] dump_stack_lvl+0x95/0xd0 [ 1033.451518][ T2624] dump_stack+0x15/0x1b [ 1033.451541][ T2624] should_fail_ex+0x263/0x280 [ 1033.451614][ T2624] should_failslab+0x8c/0xb0 [ 1033.451707][ T2624] kmem_cache_alloc_noprof+0x66/0x400 [ 1033.451736][ T2624] ? security_inode_alloc+0x37/0x100 [ 1033.451757][ T2624] security_inode_alloc+0x37/0x100 [ 1033.451816][ T2624] inode_init_always_gfp+0x4b7/0x500 [ 1033.451894][ T2624] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 1033.451916][ T2624] alloc_inode+0x58/0x170 [ 1033.451931][ T2624] new_inode+0x1d/0xe0 [ 1033.451948][ T2624] shmem_get_inode+0x246/0x750 [ 1033.452037][ T2624] __shmem_file_setup+0x112/0x210 [ 1033.452056][ T2624] shmem_file_setup+0x3b/0x50 [ 1033.452083][ T2624] memfd_alloc_file+0x4e/0x300 [ 1033.452106][ T2624] __se_sys_memfd_create+0x2e1/0x3b0 [ 1033.452165][ T2624] __x64_sys_memfd_create+0x31/0x40 [ 1033.452196][ T2624] x64_sys_call+0x1f22/0x3020 [ 1033.452240][ T2624] do_syscall_64+0x12c/0x370 [ 1033.452278][ T2624] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1033.452334][ T2624] RIP: 0033:0x7f1179aac629 [ 1033.452347][ T2624] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1033.452412][ T2624] RSP: 002b:00007f11784fed58 EFLAGS: 00000206 ORIG_RAX: 000000000000013f [ 1033.452435][ T2624] RAX: ffffffffffffffda RBX: 00000000000005db RCX: 00007f1179aac629 [ 1033.452504][ T2624] RDX: 00007f11784feddc RSI: 0000000000000000 RDI: 00007f1179b42d19 [ 1033.452542][ T2624] RBP: 0000200000000600 R08: 00000000ffffffff R09: 0000000000000000 [ 1033.452553][ T2624] R10: 0000000000000001 R11: 0000000000000206 R12: 0000000000000001 [ 1033.452564][ T2624] R13: 00007f11784feddc R14: 00007f11784fede0 R15: 00007ffcf41a9608 [ 1033.452625][ T2624] [ 1033.553709][T24321] usb 3-1: new low-speed USB device number 14 using vhci_hcd [ 1033.873468][ T2630] lo speed is unknown, defaulting to 1000 [ 1034.174109][ T2607] vhci_hcd: connection reset by peer [ 1034.180030][ T3844] vhci_hcd vhci_hcd.1: stop threads [ 1034.186496][ T3844] vhci_hcd vhci_hcd.1: release socket [ 1034.193972][ T3844] vhci_hcd vhci_hcd.1: disconnect device [ 1034.287868][ T2653] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1034.357487][ T28] audit: type=1326 audit(1771437915.896:4721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2652 comm="syz.3.8489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1034.381470][ T28] audit: type=1326 audit(1771437915.896:4722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2652 comm="syz.3.8489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1034.408564][ T28] audit: type=1326 audit(1771437915.896:4723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2652 comm="syz.3.8489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=91 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1034.432034][ T28] audit: type=1326 audit(1771437915.896:4724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2652 comm="syz.3.8489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1034.455686][ T28] audit: type=1326 audit(1771437915.896:4725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2652 comm="syz.3.8489" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1035.177852][ T2675] FAULT_INJECTION: forcing a failure. [ 1035.177852][ T2675] name failslab, interval 1, probability 0, space 0, times 0 [ 1035.193670][ T2675] CPU: 0 UID: 0 PID: 2675 Comm: syz.8.8498 Tainted: G W syzkaller #0 PREEMPT(full) [ 1035.193700][ T2675] Tainted: [W]=WARN [ 1035.193707][ T2675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1035.193719][ T2675] Call Trace: [ 1035.193727][ T2675] [ 1035.193736][ T2675] __dump_stack+0x1d/0x30 [ 1035.193777][ T2675] dump_stack_lvl+0x95/0xd0 [ 1035.193839][ T2675] dump_stack+0x15/0x1b [ 1035.193863][ T2675] should_fail_ex+0x263/0x280 [ 1035.193965][ T2675] should_failslab+0x8c/0xb0 [ 1035.194065][ T2675] __kmalloc_noprof+0xb8/0x4e0 [ 1035.194085][ T2675] ? udpv6_init_sock+0xfa/0x1f0 [ 1035.194112][ T2675] udpv6_init_sock+0xfa/0x1f0 [ 1035.194143][ T2675] inet6_create+0x7fd/0x870 [ 1035.194246][ T2675] __sock_create+0x2e4/0x580 [ 1035.194289][ T2675] __sys_socket+0xaf/0x180 [ 1035.194407][ T2675] __x64_sys_socket+0x3f/0x50 [ 1035.194590][ T2675] x64_sys_call+0x11fc/0x3020 [ 1035.194627][ T2675] do_syscall_64+0x12c/0x370 [ 1035.194680][ T2675] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1035.194708][ T2675] RIP: 0033:0x7fe68564c629 [ 1035.194727][ T2675] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1035.194842][ T2675] RSP: 002b:00007fe6840a7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 1035.194868][ T2675] RAX: ffffffffffffffda RBX: 00007fe6858c5fa0 RCX: 00007fe68564c629 [ 1035.194887][ T2675] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000000a [ 1035.194908][ T2675] RBP: 00007fe6840a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1035.194920][ T2675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1035.194932][ T2675] R13: 00007fe6858c6038 R14: 00007fe6858c5fa0 R15: 00007ffecfbffd68 [ 1035.194951][ T2675] [ 1035.209314][ T2679] __nla_validate_parse: 5 callbacks suppressed [ 1035.209339][ T2679] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8499'. [ 1035.829792][ T3538] IPVS: starting estimator thread 0... [ 1035.837027][ T2703] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 1035.926950][ T2708] IPVS: using max 2352 ests per chain, 117600 per kthread [ 1036.091313][ T2718] lo speed is unknown, defaulting to 1000 [ 1036.097500][ T2700] Process accounting resumed [ 1036.280885][ T2718] chnl_net:caif_netlink_parms(): no params data found [ 1036.309013][ T2747] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 1036.320843][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 1036.320862][ T28] audit: type=1400 audit(1771437917.729:4730): avc: denied { name_bind } for pid=2755 comm="syz.8.8526" src=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 1036.348507][T24355] IPVS: starting estimator thread 0... [ 1036.354551][ T28] audit: type=1400 audit(1771437917.729:4731): avc: denied { getopt } for pid=2755 comm="syz.8.8526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1036.398492][ T2718] bridge0: port 1(bridge_slave_0) entered blocking state [ 1036.407115][ T2718] bridge0: port 1(bridge_slave_0) entered disabled state [ 1036.414525][ T2718] bridge_slave_0: entered allmulticast mode [ 1036.427267][ T2718] bridge_slave_0: entered promiscuous mode [ 1036.434799][ T2718] bridge0: port 2(bridge_slave_1) entered blocking state [ 1036.442112][ T2718] bridge0: port 2(bridge_slave_1) entered disabled state [ 1036.449523][ T2718] bridge_slave_1: entered allmulticast mode [ 1036.458254][ T2718] bridge_slave_1: entered promiscuous mode [ 1036.458915][ T2772] netlink: 'syz.9.8528': attribute type 1 has an invalid length. [ 1036.472238][ T2762] IPVS: using max 2592 ests per chain, 129600 per kthread [ 1036.486554][ T2761] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1036.496922][ T2761] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 1036.514328][ T2768] netlink: 8 bytes leftover after parsing attributes in process `syz.8.8529'. [ 1036.527606][ T3844] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1036.547141][ T28] audit: type=1326 audit(1771437917.944:4732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2767 comm="syz.8.8529" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe68564c629 code=0x7ffc0000 [ 1036.576662][ T28] audit: type=1326 audit(1771437917.944:4733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2767 comm="syz.8.8529" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe68564c629 code=0x7ffc0000 [ 1036.600396][ T28] audit: type=1326 audit(1771437917.944:4734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2767 comm="syz.8.8529" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe68564c629 code=0x7ffc0000 [ 1036.625558][ T2768] netlink: 12 bytes leftover after parsing attributes in process `syz.8.8529'. [ 1036.651203][ T2768] netlink: 48 bytes leftover after parsing attributes in process `syz.8.8529'. [ 1036.656789][ T2773] bond1: entered promiscuous mode [ 1036.661154][ T28] audit: type=1326 audit(1771437917.944:4735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2767 comm="syz.8.8529" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fe68564c629 code=0x7ffc0000 [ 1036.689684][ T28] audit: type=1326 audit(1771437917.944:4736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2767 comm="syz.8.8529" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe68564c629 code=0x7ffc0000 [ 1036.716032][ T28] audit: type=1326 audit(1771437917.944:4737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2767 comm="syz.8.8529" exe="/root/syz-executor" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7fe68564c629 code=0x7ffc0000 [ 1036.739811][ T28] audit: type=1326 audit(1771437917.944:4738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2767 comm="syz.8.8529" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe68564c629 code=0x7ffc0000 [ 1036.763661][ T28] audit: type=1326 audit(1771437917.944:4739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2767 comm="syz.8.8529" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fe68564c629 code=0x7ffc0000 [ 1036.792186][ T2773] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1036.813654][ T2776] bond2: (slave ip6gretap1): making interface the new active one [ 1036.827718][ T2776] bond2: (slave ip6gretap1): Enslaving as an active interface with an up link [ 1036.841957][ T2718] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1036.854022][ T3844] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1036.872381][ T2781] bridge1: entered promiscuous mode [ 1036.976534][ T2774] netlink: 8 bytes leftover after parsing attributes in process `syz.8.8529'. [ 1036.998797][ T2761] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1037.014615][ T2761] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 1037.031992][ T2718] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1037.076901][ T3844] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1037.116160][ T2718] team0: Port device team_slave_0 added [ 1037.161467][ T2761] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1037.173192][ T2761] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 1037.190433][ T2718] team0: Port device team_slave_1 added [ 1037.199269][ T3844] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1037.242208][ T2761] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1037.266098][ T2761] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 1037.282882][ T2718] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1037.290131][ T2718] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1037.316542][ T2718] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1037.341375][ T2718] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1037.352881][ T2718] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1037.379374][ T2718] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1037.437841][ T3846] netdevsim netdevsim9 eth0: set [1, 0] type 2 family 0 port 20000 - 0 [ 1037.446372][ T3846] netdevsim netdevsim9 eth0: set [1, 1] type 2 family 0 port 6081 - 0 [ 1037.506415][ T3846] netdevsim netdevsim9 eth1: set [1, 0] type 2 family 0 port 20000 - 0 [ 1037.515336][ T3846] netdevsim netdevsim9 eth1: set [1, 1] type 2 family 0 port 6081 - 0 [ 1037.523944][ T3846] netdevsim netdevsim9 eth2: set [1, 0] type 2 family 0 port 20000 - 0 [ 1037.532602][ T3846] netdevsim netdevsim9 eth2: set [1, 1] type 2 family 0 port 6081 - 0 [ 1037.543752][ T2718] hsr_slave_0: entered promiscuous mode [ 1037.550189][ T2718] hsr_slave_1: entered promiscuous mode [ 1037.556352][ T2718] debugfs: 'hsr0' already exists in 'hsr' [ 1037.562133][ T2718] Cannot create hsr debugfs directory [ 1037.575900][ T3846] netdevsim netdevsim9 eth3: set [1, 0] type 2 family 0 port 20000 - 0 [ 1037.592199][ T3846] netdevsim netdevsim9 eth3: set [1, 1] type 2 family 0 port 6081 - 0 [ 1037.601034][ T3844] bridge_slave_1: left allmulticast mode [ 1037.606794][ T3844] bridge_slave_1: left promiscuous mode [ 1037.613096][ T3844] bridge0: port 2(bridge_slave_1) entered disabled state [ 1037.821637][ T3844] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1037.832003][ T3844] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1037.842156][ T3844] bond0 (unregistering): Released all slaves [ 1037.870826][ T2814] tmpfs: Bad value for 'gid' [ 1037.875582][ T2814] tmpfs: Bad value for 'gid' [ 1037.880750][ T3844] tipc: Left network mode [ 1037.893653][ T3844] hsr_slave_0: left promiscuous mode [ 1037.900032][ T3844] hsr_slave_1: left promiscuous mode [ 1037.906965][ T3844] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1037.914604][ T3844] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1037.922560][ T3844] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1037.930570][ T3844] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1037.943142][ T3844] veth1_macvtap: left promiscuous mode [ 1037.948824][ T3844] veth0_macvtap: left promiscuous mode [ 1037.954645][ T3844] veth1_vlan: left promiscuous mode [ 1037.960345][ T3844] veth0_vlan: left promiscuous mode [ 1038.061259][ T3844] team0 (unregistering): Port device team_slave_1 removed [ 1038.073267][ T3844] team0 (unregistering): Port device team_slave_0 removed [ 1038.119663][ T2824] netlink: 8 bytes leftover after parsing attributes in process `syz.5.8547'. [ 1038.149538][ T2824] netlink: 12 bytes leftover after parsing attributes in process `syz.5.8547'. [ 1038.184793][ T2824] netlink: 8 bytes leftover after parsing attributes in process `syz.5.8547'. [ 1038.216180][ T2837] FAULT_INJECTION: forcing a failure. [ 1038.216180][ T2837] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1038.234014][ T2837] CPU: 0 UID: 0 PID: 2837 Comm: syz.5.8550 Tainted: G W syzkaller #0 PREEMPT(full) [ 1038.234119][ T2837] Tainted: [W]=WARN [ 1038.234126][ T2837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1038.234200][ T2837] Call Trace: [ 1038.234208][ T2837] [ 1038.234218][ T2837] __dump_stack+0x1d/0x30 [ 1038.234249][ T2837] dump_stack_lvl+0x95/0xd0 [ 1038.234271][ T2837] dump_stack+0x15/0x1b [ 1038.234294][ T2837] should_fail_ex+0x263/0x280 [ 1038.234353][ T2837] should_fail+0xb/0x20 [ 1038.234371][ T2837] should_fail_usercopy+0x1a/0x20 [ 1038.234397][ T2837] _copy_from_iter+0xcf/0xea0 [ 1038.234458][ T2837] ? __alloc_skb+0x4f6/0x690 [ 1038.234527][ T2837] ? __alloc_skb+0x200/0x690 [ 1038.234548][ T2837] netlink_sendmsg+0x4ae/0x6f0 [ 1038.234576][ T2837] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1038.234656][ T2837] ____sys_sendmsg+0x5af/0x600 [ 1038.234692][ T2837] ___sys_sendmsg+0x195/0x1e0 [ 1038.234760][ T2837] __x64_sys_sendmsg+0xd4/0x160 [ 1038.234798][ T2837] x64_sys_call+0x194c/0x3020 [ 1038.234832][ T2837] do_syscall_64+0x12c/0x370 [ 1038.234933][ T2837] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1038.234955][ T2837] RIP: 0033:0x7f88b2d4c629 [ 1038.234973][ T2837] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1038.234995][ T2837] RSP: 002b:00007f88b17a7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1038.235019][ T2837] RAX: ffffffffffffffda RBX: 00007f88b2fc5fa0 RCX: 00007f88b2d4c629 [ 1038.235073][ T2837] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000003 [ 1038.235086][ T2837] RBP: 00007f88b17a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1038.235101][ T2837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1038.235116][ T2837] R13: 00007f88b2fc6038 R14: 00007f88b2fc5fa0 R15: 00007ffff760fec8 [ 1038.235201][ T2837] [ 1038.862717][ T2888] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1038.872227][ T2888] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1038.900600][ T2718] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1038.912200][ T2718] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1038.928818][ T2718] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1038.944149][ T2718] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1038.985839][ T2905] x_tables: ip_tables: recent.0 match: invalid size 216 (kernel) != (user) 4096 [ 1039.029853][ T2718] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1039.049301][T24321] usb 3-1: enqueue for inactive port 0 [ 1039.051073][ T2718] 8021q: adding VLAN 0 to HW filter on device team0 [ 1039.054862][T24321] usb 3-1: enqueue for inactive port 0 [ 1039.067894][ T3850] bridge0: port 1(bridge_slave_0) entered blocking state [ 1039.075059][ T3850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1039.127148][ T3850] bridge0: port 2(bridge_slave_1) entered blocking state [ 1039.134284][ T3850] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1039.187777][T24321] vhci_hcd vhci_hcd.1: vhci_device speed not set [ 1039.250476][ T2718] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1039.339718][ T2718] veth0_vlan: entered promiscuous mode [ 1039.348972][ T2718] veth1_vlan: entered promiscuous mode [ 1039.367197][ T2718] veth0_macvtap: entered promiscuous mode [ 1039.375701][ T2718] veth1_macvtap: entered promiscuous mode [ 1039.388259][ T2718] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1039.400846][ T2718] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1039.416526][ T3833] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1039.425324][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811b3c7600: rx timeout, send abort [ 1039.434887][ T3833] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1039.453857][ T3833] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1039.467626][ T3833] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1039.531386][ T2955] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8512'. [ 1039.546266][ T2952] ieee802154 phy1 wpan1: encryption failed: -22 [ 1039.639663][ T2971] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8577'. [ 1039.956139][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811b3c7000: rx timeout, send abort [ 1039.965234][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811b3c7600: abort rx timeout. Force session deactivation [ 1039.978274][ T2996] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1039.986812][ T2996] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1040.075043][ T3001] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1040.083588][ T3001] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1040.498993][ C1] vcan0: j1939_tp_rxtimer: 0xffff88811b3c7000: abort rx timeout. Force session deactivation [ 1040.623101][ T3029] __nla_validate_parse: 8 callbacks suppressed [ 1040.623118][ T3029] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8593'. [ 1040.840988][ T3037] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 1040.841216][T13912] IPVS: starting estimator thread 0... [ 1040.962164][ T3045] IPVS: using max 2208 ests per chain, 110400 per kthread [ 1041.084233][ T3049] netlink: 8 bytes leftover after parsing attributes in process `syz.8.8599'. [ 1041.570681][ T3081] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 1041.577221][ T3081] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1041.584891][ T3081] vhci_hcd vhci_hcd.0: Device attached [ 1041.902918][T13912] usb 11-1: new low-speed USB device number 13 using vhci_hcd [ 1041.967654][ T3093] FAULT_INJECTION: forcing a failure. [ 1041.967654][ T3093] name failslab, interval 1, probability 0, space 0, times 0 [ 1041.980392][ T3093] CPU: 0 UID: 0 PID: 3093 Comm: syz.1.8613 Tainted: G W syzkaller #0 PREEMPT(full) [ 1041.980466][ T3093] Tainted: [W]=WARN [ 1041.980474][ T3093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1041.980489][ T3093] Call Trace: [ 1041.980497][ T3093] [ 1041.980506][ T3093] __dump_stack+0x1d/0x30 [ 1041.980570][ T3093] dump_stack_lvl+0x95/0xd0 [ 1041.980592][ T3093] dump_stack+0x15/0x1b [ 1041.980618][ T3093] should_fail_ex+0x263/0x280 [ 1041.980658][ T3093] ? sctp_add_bind_addr+0x71/0x1e0 [ 1041.980735][ T3093] should_failslab+0x8c/0xb0 [ 1041.980804][ T3093] __kmalloc_cache_noprof+0x5f/0x410 [ 1041.980858][ T3093] sctp_add_bind_addr+0x71/0x1e0 [ 1041.980887][ T3093] sctp_do_bind+0x427/0x4b0 [ 1041.980928][ T3093] sctp_connect_new_asoc+0x153/0x3a0 [ 1041.981044][ T3093] __sctp_connect+0x424/0x7a0 [ 1041.981088][ T3093] sctp_inet_connect+0xe8/0x110 [ 1041.981121][ T3093] ? __pfx_sctp_inet_connect+0x10/0x10 [ 1041.981172][ T3093] __sys_connect+0x1f1/0x2a0 [ 1041.981195][ T3093] __x64_sys_connect+0x3f/0x50 [ 1041.981217][ T3093] x64_sys_call+0x2df0/0x3020 [ 1041.981249][ T3093] do_syscall_64+0x12c/0x370 [ 1041.981288][ T3093] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1041.981308][ T3093] RIP: 0033:0x7f12e5eac629 [ 1041.981389][ T3093] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1041.981440][ T3093] RSP: 002b:00007f12e48bd028 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1041.981463][ T3093] RAX: ffffffffffffffda RBX: 00007f12e6126180 RCX: 00007f12e5eac629 [ 1041.981507][ T3093] RDX: 000000000000001c RSI: 0000200000000000 RDI: 0000000000000007 [ 1041.981519][ T3093] RBP: 00007f12e48bd090 R08: 0000000000000000 R09: 0000000000000000 [ 1041.981530][ T3093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1041.981540][ T3093] R13: 00007f12e6126218 R14: 00007f12e6126180 R15: 00007fffa6f630e8 [ 1041.981557][ T3093] [ 1042.523085][ T3082] vhci_hcd: connection reset by peer [ 1042.529231][ T3844] vhci_hcd vhci_hcd.5: stop threads [ 1042.540026][ T3844] vhci_hcd vhci_hcd.5: release socket [ 1042.556342][ T3844] vhci_hcd vhci_hcd.5: disconnect device [ 1043.015798][ T3106] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8618'. [ 1043.084723][ T3105] ieee802154 phy1 wpan1: encryption failed: -22 [ 1043.116400][ T3113] FAULT_INJECTION: forcing a failure. [ 1043.116400][ T3113] name failslab, interval 1, probability 0, space 0, times 0 [ 1043.153570][ T28] kauditd_printk_skb: 143 callbacks suppressed [ 1043.153585][ T28] audit: type=1326 audit(1771437924.109:4883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3111 comm="syz.3.8621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1043.202618][ T3113] CPU: 0 UID: 0 PID: 3113 Comm: syz.5.8620 Tainted: G W syzkaller #0 PREEMPT(full) [ 1043.202654][ T3113] Tainted: [W]=WARN [ 1043.202662][ T3113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1043.202674][ T3113] Call Trace: [ 1043.202708][ T3113] [ 1043.202715][ T3113] __dump_stack+0x1d/0x30 [ 1043.202746][ T3113] dump_stack_lvl+0x95/0xd0 [ 1043.202775][ T3113] dump_stack+0x15/0x1b [ 1043.202803][ T3113] should_fail_ex+0x263/0x280 [ 1043.202892][ T3113] should_failslab+0x8c/0xb0 [ 1043.202932][ T3113] __kvmalloc_node_noprof+0x155/0x650 [ 1043.203028][ T3113] ? file_tty_write+0x1a3/0x690 [ 1043.203144][ T3113] ? mutex_trylock+0x81/0xc0 [ 1043.203170][ T3113] file_tty_write+0x1a3/0x690 [ 1043.203205][ T3113] ? __pfx_tty_write+0x10/0x10 [ 1043.203244][ T3113] tty_write+0x25/0x30 [ 1043.203311][ T3113] vfs_write+0x5a6/0x9f0 [ 1043.203345][ T3113] ksys_write+0xdc/0x1a0 [ 1043.203383][ T3113] __x64_sys_write+0x40/0x50 [ 1043.203472][ T3113] x64_sys_call+0x27e1/0x3020 [ 1043.203577][ T3113] do_syscall_64+0x12c/0x370 [ 1043.203608][ T3113] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1043.203629][ T3113] RIP: 0033:0x7f88b2d4c629 [ 1043.203651][ T3113] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1043.203679][ T3113] RSP: 002b:00007f88b17a7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1043.203780][ T3113] RAX: ffffffffffffffda RBX: 00007f88b2fc5fa0 RCX: 00007f88b2d4c629 [ 1043.203797][ T3113] RDX: 00000000d79f6255 RSI: 0000200000001980 RDI: 0000000000000004 [ 1043.203814][ T3113] RBP: 00007f88b17a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1043.203830][ T3113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1043.203909][ T3113] R13: 00007f88b2fc6038 R14: 00007f88b2fc5fa0 R15: 00007ffff760fec8 [ 1043.203933][ T3113] [ 1043.405658][ T3119] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 1043.447546][ T28] audit: type=1326 audit(1771437924.109:4884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3111 comm="syz.3.8621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=10 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1043.529916][ T28] audit: type=1326 audit(1771437924.109:4885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3111 comm="syz.3.8621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1043.557011][ T3123] netlink: 12 bytes leftover after parsing attributes in process `syz.5.8623'. [ 1043.599121][ T28] audit: type=1326 audit(1771437924.109:4886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3111 comm="syz.3.8621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1043.663154][ T3125] netlink: 8 bytes leftover after parsing attributes in process `syz.5.8623'. [ 1043.674748][ T28] audit: type=1326 audit(1771437924.109:4887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3111 comm="syz.3.8621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1043.741781][ T28] audit: type=1326 audit(1771437924.109:4888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3111 comm="syz.3.8621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1043.799589][ T3132] FAULT_INJECTION: forcing a failure. [ 1043.799589][ T3132] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1043.818131][ T28] audit: type=1326 audit(1771437924.109:4889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3111 comm="syz.3.8621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1043.827859][ T3132] CPU: 1 UID: 0 PID: 3132 Comm: syz.5.8625 Tainted: G W syzkaller #0 PREEMPT(full) [ 1043.827964][ T3132] Tainted: [W]=WARN [ 1043.827984][ T3132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1043.828048][ T3132] Call Trace: [ 1043.828075][ T3132] [ 1043.828109][ T3132] __dump_stack+0x1d/0x30 [ 1043.828238][ T3132] dump_stack_lvl+0x95/0xd0 [ 1043.828315][ T3132] dump_stack+0x15/0x1b [ 1043.828384][ T3132] should_fail_ex+0x263/0x280 [ 1043.828490][ T3132] should_fail+0xb/0x20 [ 1043.828546][ T3132] should_fail_usercopy+0x1a/0x20 [ 1043.828685][ T3132] _copy_from_iter+0xcf/0xea0 [ 1043.828759][ T3132] ? __alloc_skb+0x4f6/0x690 [ 1043.828874][ T3132] ? __alloc_skb+0x200/0x690 [ 1043.828960][ T3132] netlink_sendmsg+0x4ae/0x6f0 [ 1043.829104][ T3132] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1043.829227][ T3132] ____sys_sendmsg+0x5af/0x600 [ 1043.829321][ T3132] ___sys_sendmsg+0x195/0x1e0 [ 1043.829530][ T3132] __x64_sys_sendmsg+0xd4/0x160 [ 1043.829731][ T3132] x64_sys_call+0x194c/0x3020 [ 1043.829872][ T3132] do_syscall_64+0x12c/0x370 [ 1043.830027][ T3132] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1043.830199][ T3132] RIP: 0033:0x7f88b2d4c629 [ 1043.830252][ T3132] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1043.830305][ T3132] RSP: 002b:00007f88b17a7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1043.830373][ T3132] RAX: ffffffffffffffda RBX: 00007f88b2fc5fa0 RCX: 00007f88b2d4c629 [ 1043.830416][ T3132] RDX: 0000000000000004 RSI: 0000200000000340 RDI: 0000000000000003 [ 1043.830457][ T3132] RBP: 00007f88b17a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1043.830528][ T3132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1043.830569][ T3132] R13: 00007f88b2fc6038 R14: 00007f88b2fc5fa0 R15: 00007ffff760fec8 [ 1043.830634][ T3132] [ 1043.930493][ T3135] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8626'. [ 1044.022157][ T28] audit: type=1326 audit(1771437924.109:4890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3111 comm="syz.3.8621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1044.068992][ T28] audit: type=1326 audit(1771437924.109:4891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3111 comm="syz.3.8621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1044.104017][ T28] audit: type=1326 audit(1771437924.399:4892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3111 comm="syz.3.8621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1179aac629 code=0x7ffc0000 [ 1044.133686][ T3142] netlink: 8 bytes leftover after parsing attributes in process `syz.5.8628'. [ 1044.206209][ T3146] FAULT_INJECTION: forcing a failure. [ 1044.206209][ T3146] name failslab, interval 1, probability 0, space 0, times 0 [ 1044.207390][ T3145] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 1044.228556][ T3150] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 1044.235175][ T3150] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1044.264470][ T3150] vhci_hcd vhci_hcd.0: Device attached [ 1044.270213][ T3146] CPU: 1 UID: 0 PID: 3146 Comm: syz.8.8619 Tainted: G W syzkaller #0 PREEMPT(full) [ 1044.270253][ T3146] Tainted: [W]=WARN [ 1044.270262][ T3146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1044.270280][ T3146] Call Trace: [ 1044.270288][ T3146] [ 1044.270297][ T3146] __dump_stack+0x1d/0x30 [ 1044.270329][ T3146] dump_stack_lvl+0x95/0xd0 [ 1044.270359][ T3146] dump_stack+0x15/0x1b [ 1044.270402][ T3146] should_fail_ex+0x263/0x280 [ 1044.270442][ T3146] should_failslab+0x8c/0xb0 [ 1044.270481][ T3146] kmem_cache_alloc_noprof+0x66/0x400 [ 1044.270602][ T3146] ? alloc_empty_file+0x76/0x200 [ 1044.270649][ T3146] alloc_empty_file+0x76/0x200 [ 1044.270679][ T3146] path_openat+0x65/0x2050 [ 1044.270718][ T3146] ? _parse_integer_limit+0x170/0x190 [ 1044.270814][ T3146] ? _parse_integer+0x27/0x40 [ 1044.270847][ T3146] ? kstrtoull+0x111/0x140 [ 1044.270961][ T3146] ? kstrtouint+0x76/0xc0 [ 1044.271001][ T3146] do_file_open+0x16c/0x290 [ 1044.271104][ T3146] do_sys_openat2+0x94/0x130 [ 1044.271134][ T3146] __x64_sys_openat+0xf2/0x120 [ 1044.271167][ T3146] x64_sys_call+0x1e39/0x3020 [ 1044.271238][ T3146] do_syscall_64+0x12c/0x370 [ 1044.271344][ T3146] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1044.271373][ T3146] RIP: 0033:0x7fe68564c629 [ 1044.271393][ T3146] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1044.271416][ T3146] RSP: 002b:00007fe684065028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1044.271442][ T3146] RAX: ffffffffffffffda RBX: 00007fe6858c6180 RCX: 00007fe68564c629 [ 1044.271494][ T3146] RDX: 0000000000000080 RSI: 00002000000015c0 RDI: ffffffffffffff9c [ 1044.271589][ T3146] RBP: 00007fe684065090 R08: 0000000000000000 R09: 0000000000000000 [ 1044.271606][ T3146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1044.271622][ T3146] R13: 00007fe6858c6218 R14: 00007fe6858c6180 R15: 00007ffecfbffd68 [ 1044.271655][ T3146] [ 1045.119531][ T3151] vhci_hcd: connection closed [ 1045.119792][ T3850] vhci_hcd vhci_hcd.5: stop threads [ 1045.133507][ T3850] vhci_hcd vhci_hcd.5: release socket [ 1045.145858][ T3850] vhci_hcd vhci_hcd.5: disconnect device [ 1045.404198][ T3189] 9p: Could not find request transport: fd0x0000000000000003 [ 1045.424448][ T3195] lo speed is unknown, defaulting to 1000 [ 1046.068088][ T3230] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8656'. [ 1046.080862][ T3230] netlink: 48 bytes leftover after parsing attributes in process `syz.9.8656'. [ 1046.116320][ T3230] netlink: 8 bytes leftover after parsing attributes in process `syz.9.8656'. [ 1046.199758][ T3228] SELinux: security_context_str_to_sid (8Ӎ CWyP A`aivaGpkjadeȴWO^ [ 1046.199758][ T3228] 8) failed with errno=-22 [ 1046.327288][ T3255] netlink: 16 bytes leftover after parsing attributes in process `syz.3.8665'. [ 1046.439092][ T3263] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8670'. [ 1046.455983][ T3269] netlink: 48 bytes leftover after parsing attributes in process `syz.5.8671'. [ 1046.508634][ T3273] FAULT_INJECTION: forcing a failure. [ 1046.508634][ T3273] name failslab, interval 1, probability 0, space 0, times 0 [ 1046.529786][ T3273] CPU: 1 UID: 0 PID: 3273 Comm: syz.5.8673 Tainted: G W syzkaller #0 PREEMPT(full) [ 1046.529821][ T3273] Tainted: [W]=WARN [ 1046.529828][ T3273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1046.529840][ T3273] Call Trace: [ 1046.529846][ T3273] [ 1046.529853][ T3273] __dump_stack+0x1d/0x30 [ 1046.529884][ T3273] dump_stack_lvl+0x95/0xd0 [ 1046.529914][ T3273] dump_stack+0x15/0x1b [ 1046.529942][ T3273] should_fail_ex+0x263/0x280 [ 1046.529982][ T3273] should_failslab+0x8c/0xb0 [ 1046.530024][ T3273] kmem_cache_alloc_noprof+0x66/0x400 [ 1046.530068][ T3273] ? mas_alloc_nodes+0x1a2/0x210 [ 1046.530107][ T3273] mas_alloc_nodes+0x1a2/0x210 [ 1046.530146][ T3273] mas_preallocate+0x2ca/0x510 [ 1046.530200][ T3273] __split_vma+0x240/0x640 [ 1046.530240][ T3273] vma_modify+0xb2e/0xd00 [ 1046.530276][ T3273] ? __pfx_queue_pages_test_walk+0x10/0x10 [ 1046.530313][ T3273] vma_modify_policy+0x177/0x1b0 [ 1046.530350][ T3273] mbind_range+0x1b8/0x440 [ 1046.530376][ T3273] ? mas_find+0x5d5/0x700 [ 1046.530404][ T3273] __se_sys_mbind+0x8b1/0xde0 [ 1046.530436][ T3273] __x64_sys_mbind+0x78/0x90 [ 1046.530464][ T3273] x64_sys_call+0x2b72/0x3020 [ 1046.530496][ T3273] do_syscall_64+0x12c/0x370 [ 1046.530532][ T3273] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1046.530554][ T3273] RIP: 0033:0x7f88b2d4c629 [ 1046.530568][ T3273] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1046.530585][ T3273] RSP: 002b:00007f88b17a7028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ed [ 1046.530604][ T3273] RAX: ffffffffffffffda RBX: 00007f88b2fc5fa0 RCX: 00007f88b2d4c629 [ 1046.530618][ T3273] RDX: 0000000000000001 RSI: 0000000000004000 RDI: 0000200000001000 [ 1046.530632][ T3273] RBP: 00007f88b17a7090 R08: 0000000000000081 R09: 0000000000000003 [ 1046.530646][ T3273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1046.530657][ T3273] R13: 00007f88b2fc6038 R14: 00007f88b2fc5fa0 R15: 00007ffff760fec8 [ 1046.530680][ T3273] [ 1047.159528][ T3312] SELinux: security_context_str_to_sid () failed with errno=-22 [ 1047.291010][T13912] usb 11-1: enqueue for inactive port 0 [ 1047.296611][T13912] usb 11-1: enqueue for inactive port 0 [ 1047.408053][T13912] vhci_hcd vhci_hcd.5: vhci_device speed not set [ 1048.457406][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 1048.779304][ T3337] lo speed is unknown, defaulting to 1000 [ 1048.860601][ T3331] lo speed is unknown, defaulting to 1000 [ 1049.030480][ T3340] SELinux: security_context_str_to_sid (8Ӎ CWyP A`aivaGpkjadeȴWO^ [ 1049.030480][ T3340] 8) failed with errno=-22 [ 1049.664726][ T3370] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(4) [ 1049.671360][ T3370] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1049.696662][ T3370] vhci_hcd vhci_hcd.0: Device attached [ 1049.797124][ T3387] lo speed is unknown, defaulting to 1000 [ 1049.804974][ T28] kauditd_printk_skb: 116 callbacks suppressed [ 1049.805001][ T28] audit: type=1326 audit(1771437930.348:5009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3388 comm="syz.5.8710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88b2d4c629 code=0x7ffc0000 [ 1049.856756][ T28] audit: type=1326 audit(1771437930.348:5010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3388 comm="syz.5.8710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88b2d4c629 code=0x7ffc0000 [ 1049.903077][ T28] audit: type=1326 audit(1771437930.376:5011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3388 comm="syz.5.8710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=91 compat=0 ip=0x7f88b2d4c629 code=0x7ffc0000 [ 1049.997718][ T28] audit: type=1326 audit(1771437930.376:5012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3388 comm="syz.5.8710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88b2d4c629 code=0x7ffc0000 [ 1050.045351][ T28] audit: type=1326 audit(1771437930.376:5013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3388 comm="syz.5.8710" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88b2d4c629 code=0x7ffc0000 [ 1050.092786][ T28] audit: type=1326 audit(1771437930.469:5014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3392 comm="syz.5.8711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88b2d4c629 code=0x7ffc0000 [ 1050.140479][ T28] audit: type=1326 audit(1771437930.479:5015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3392 comm="syz.5.8711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88b2d4c629 code=0x7ffc0000 [ 1050.188139][ T28] audit: type=1326 audit(1771437930.498:5016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3392 comm="syz.5.8711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88b2d4c629 code=0x7ffc0000 [ 1050.225712][ T28] audit: type=1326 audit(1771437930.498:5017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3392 comm="syz.5.8711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88b2d4c629 code=0x7ffc0000 [ 1050.273754][ T28] audit: type=1326 audit(1771437930.516:5018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3392 comm="syz.5.8711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f88b2d4c629 code=0x7ffc0000 [ 1050.359817][ T3423] ieee802154 phy1 wpan1: encryption failed: -22 [ 1050.544791][ T3375] vhci_hcd: connection closed [ 1050.573440][ T36] vhci_hcd vhci_hcd.3: stop threads [ 1050.583484][ T36] vhci_hcd vhci_hcd.3: release socket [ 1050.594217][ T36] vhci_hcd vhci_hcd.3: disconnect device [ 1050.675221][ T3436] SELinux: security_context_str_to_sid (8Ӎ CWyP A`aivaGpkjadeȴWO^ [ 1050.675221][ T3436] 8) failed with errno=-22 [ 1050.728537][ T3440] ieee802154 phy1 wpan1: encryption failed: -22 [ 1050.821480][ T3450] ref_tracker: memory allocation failure, unreliable refcount tracker. [ 1050.889421][ T3452] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 1050.904612][ T3454] lo speed is unknown, defaulting to 1000 [ 1051.181379][ T3475] 9pnet_fd: Insufficient options for proto=fd [ 1051.241330][ T3482] vhci_hcd vhci_hcd.0: pdev(8) rhport(0) sockfd(4) [ 1051.247976][ T3482] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1051.256243][ T3482] vhci_hcd vhci_hcd.0: Device attached [ 1051.373749][ T3491] lo speed is unknown, defaulting to 1000 [ 1051.394202][ T3495] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 1051.422860][ T3497] FAULT_INJECTION: forcing a failure. [ 1051.422860][ T3497] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1051.436257][ T3497] CPU: 1 UID: 0 PID: 3497 Comm: syz.5.8745 Tainted: G W syzkaller #0 PREEMPT(full) [ 1051.436287][ T3497] Tainted: [W]=WARN [ 1051.436294][ T3497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1051.436316][ T3497] Call Trace: [ 1051.436324][ T3497] [ 1051.436334][ T3497] __dump_stack+0x1d/0x30 [ 1051.436368][ T3497] dump_stack_lvl+0x95/0xd0 [ 1051.436397][ T3497] dump_stack+0x15/0x1b [ 1051.436420][ T3497] should_fail_ex+0x263/0x280 [ 1051.436483][ T3497] should_fail+0xb/0x20 [ 1051.436526][ T3497] should_fail_usercopy+0x1a/0x20 [ 1051.436607][ T3497] _copy_from_user+0x1c/0xb0 [ 1051.436702][ T3497] bpf_test_init+0xb9/0x130 [ 1051.436749][ T3497] bpf_prog_test_run_skb+0x2b5/0xef0 [ 1051.436783][ T3497] ? __fget_files+0x184/0x1c0 [ 1051.436813][ T3497] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 1051.436836][ T3497] bpf_prog_test_run+0x204/0x340 [ 1051.436861][ T3497] __sys_bpf+0x52e/0x7e0 [ 1051.436958][ T3497] __x64_sys_bpf+0x41/0x50 [ 1051.437013][ T3497] x64_sys_call+0x10cb/0x3020 [ 1051.437092][ T3497] do_syscall_64+0x12c/0x370 [ 1051.437127][ T3497] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1051.437159][ T3497] RIP: 0033:0x7f88b2d4c629 [ 1051.437190][ T3497] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1051.437218][ T3497] RSP: 002b:00007f88b17a7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1051.437238][ T3497] RAX: ffffffffffffffda RBX: 00007f88b2fc5fa0 RCX: 00007f88b2d4c629 [ 1051.437252][ T3497] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 1051.437273][ T3497] RBP: 00007f88b17a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1051.437333][ T3497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1051.437348][ T3497] R13: 00007f88b2fc6038 R14: 00007f88b2fc5fa0 R15: 00007ffff760fec8 [ 1051.437370][ T3497] [ 1051.503268][T24342] usb 17-1: new low-speed USB device number 8 using vhci_hcd [ 1051.636715][ T3483] vhci_hcd: connection closed [ 1051.637000][ T36] vhci_hcd vhci_hcd.8: stop threads [ 1051.647677][ T36] vhci_hcd vhci_hcd.8: release socket [ 1051.653297][ T36] vhci_hcd vhci_hcd.8: disconnect device [ 1051.659072][T24342] usb 17-1: enqueue for inactive port 0 [ 1051.664932][T24342] usb 17-1: enqueue for inactive port 0 [ 1051.665165][ T2991] ================================================================== [ 1051.670541][T24342] usb 17-1: enqueue for inactive port 0 [ 1051.678691][ T2991] BUG: KCSAN: data-race in _prb_read_valid / prb_reserve [ 1051.691172][ T2991] [ 1051.693493][ T2991] write to 0xffffffff86cd25e8 of 88 bytes by task 24342 on cpu 0: [ 1051.701292][ T2991] prb_reserve+0x6e6/0xae0 [ 1051.705746][ T2991] vprintk_store+0x54a/0x910 [ 1051.710377][ T2991] vprintk_emit+0x1a4/0x600 [ 1051.714900][ T2991] dev_vprintk_emit+0x242/0x2a0 [ 1051.719795][ T2991] dev_printk_emit+0x84/0xb0 [ 1051.724418][ T2991] __dev_printk+0xf3/0x110 [ 1051.728930][ T2991] _dev_err+0xa6/0xd0 [ 1051.732923][ T2991] vhci_urb_enqueue+0x4cb/0x6d0 [ 1051.737787][ T2991] usb_hcd_submit_urb+0x208/0x1200 [ 1051.742901][ T2991] usb_submit_urb+0xaaa/0xbb0 [ 1051.747670][ T2991] usb_start_wait_urb+0x8c/0x1a0 [ 1051.749367][T24342] vhci_hcd vhci_hcd.8: vhci_device speed not set [ 1051.752615][ T2991] usb_control_msg+0x180/0x240 [ 1051.763724][ T2991] get_bMaxPacketSize0+0x205/0x430 [ 1051.768883][ T2991] hub_port_init+0x758/0x1750 [ 1051.773590][ T2991] hub_event+0x1aa4/0x2a60 [ 1051.778043][ T2991] process_scheduled_works+0x4de/0x9e0 [ 1051.783544][ T2991] worker_thread+0x581/0x770 [ 1051.788152][ T2991] kthread+0x22a/0x280 [ 1051.792237][ T2991] ret_from_fork+0x150/0x360 [ 1051.796843][ T2991] ret_from_fork_asm+0x1a/0x30 [ 1051.801626][ T2991] [ 1051.803957][ T2991] read to 0xffffffff86cd25e8 of 8 bytes by task 2991 on cpu 1: [ 1051.811522][ T2991] _prb_read_valid+0x383/0x950 [ 1051.816310][ T2991] prb_read_valid+0x3c/0x60 [ 1051.820833][ T2991] syslog_print+0x164/0x560 [ 1051.825357][ T2991] do_syslog+0x52b/0x7f0 [ 1051.829629][ T2991] __x64_sys_syslog+0x41/0x50 [ 1051.834318][ T2991] x64_sys_call+0x2b9e/0x3020 [ 1051.839023][ T2991] do_syscall_64+0x12c/0x370 [ 1051.843631][ T2991] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1051.849529][ T2991] [ 1051.851858][ T2991] value changed: 0x0000000000002a37 -> 0x0000000000004a37 [ 1051.858968][ T2991] [ 1051.861294][ T2991] Reported by Kernel Concurrency Sanitizer on: [ 1051.867457][ T2991] CPU: 1 UID: 0 PID: 2991 Comm: klogd Tainted: G W syzkaller #0 PREEMPT(full) [ 1051.877911][ T2991] Tainted: [W]=WARN [ 1051.881756][ T2991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1051.891822][ T2991] ==================================================================